admin
April 29, 2025
In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living...
admin
April 29, 2025
Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user...
Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products

3 min read
admin
April 29, 2025
Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024, down from...
admin
April 29, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom...
⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

20 min read
admin
April 28, 2025
What happens when cybercriminals no longer need deep skills to breach your defenses? Today’s attackers are armed...
admin
April 28, 2025
Not every security vulnerability is high risk on its own - but in the hands of an...
admin
April 28, 2025
Government and telecommunications sectors in Southeast Asia have become the target of a "sophisticated" campaign undertaken by...
admin
April 28, 2025
Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert...
admin
April 28, 2025
Threat actors have been observed exploiting two newly disclosed critical security flaws in Craft CMS in zero-day...
Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

2 min read
admin
April 27, 2025
Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against...
admin
April 26, 2025
Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been...
admin
April 25, 2025
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to...
admin
April 25, 2025
Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with...
admin
April 25, 2025
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA...
admin
April 25, 2025
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully...
admin
April 25, 2025
Cybersecurity researchers are warning about a new malware called DslogdRAT that's installed following the exploitation of a...
admin
April 24, 2025
At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group...
admin
April 24, 2025
Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism...
admin
April 24, 2025
The Evolving Healthcare Cybersecurity Landscape
Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments...
admin
April 24, 2025
A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code...