APT Groups Exploits Vulnerabilities Windows2 Min Read April 27, 2026 The Zero-Click Vulnerability: Akamai Uncovers Incomplete Patch for APT28 Exploit Conceptual flow of the original CVE-2026-21510 exploitation | Image: Akamai Researchers at Akamai have discovered that a previous fix for a…
Captcha Cyber Attack Cybersecurity Infostealer JPEG Malware Security Vidar Windows3 Min Read April 27, 2026 Vidar Infostealer Spreads via Fake CAPTCHAs, Hides in JPEG and TXT Files New research from the Lat61 Threat Intelligence Team at Point Wild reveals that hackers are now hiding malicious code inside everyday files…
Linux Malware Nation-state Windows2 Min Read April 27, 2026 Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet Security researchers have identified malware dating back to 2005 that appears to have been designed to disrupt Iran’s nuclear program…
Captcha ClickFix Cyber Attack Cybersecurity Fraud Malware Scam Scams and Fraud Security Windows3 Min Read April 24, 2026 New ClickFix attack Hides in Native Windows Tools to Reduce Detection Risk A new ClickFix attack campaign uses fake CAPTCHA pages to trick users into running malicious commands. Learn how hackers use cmdkey and…
Phishing Ransomware Vulnerabilities Windows2 Min Read April 24, 2026 Microsoft beefs up Remote Desktop security with … hard-to-read messages Microsoft's update to harden Remote Desktop against phishing attacks has arrived. When users open a Remote Desktop (.rdp) file, they should…
Apple Linux Vulnerabilities Windows2 Min Read April 24, 2026 Python Vulnerability Allows Out-of-Bounds Write on Windows Systems A security vulnerability has been discovered in Python’s Windows asyncio implementation, allowing attackers to trigger out-of-bounds…
Data Breach Linux Vulnerabilities Windows2 Min Read April 24, 2026 Hackers Can Exploit Ollama Model Uploads to Leak Sensitive Server Data A critical, unpatched vulnerability has been discovered in Ollama, a widely used open-source platform for running Large Language Models…
Apple Windows2 Min Read April 23, 2026 NCSC Backs Passkeys, Hailing a New Era of Sign-in The UK’s National Cyber Security Centre (NSCS) has fully backed passkeys, stating that it should be “should now be…
Apple Malware Network Windows2 Min Read April 22, 2026 MacOS Native Tools Enable Stealthy Enterprise Attacks A growing range of native macOS features are being repurposed by attackers to execute code, move laterally and evade detection, according to…
Cloud Security Linux Malware Windows15 Min Read March 31, 2026 Compromised axios npm package delivers cross-platform RAT Key points and observations On March 31, 2026, an attacker hijacked an axios npm maintainer account and published two malicious releases:…
Data Breach Malware Phishing Windows8 Min Read March 10, 2026 Uncovering agent logging gaps in Copilot Studio Key points From at least August 29, 2025 to September 25, 2025, Microsoft Copilot Studio did not log certain administrative actions related to…
Cloud Security Malware Ransomware Windows14 Min Read February 10, 2026 Tech impersonators: ClickFix and MacOS infostealers Key points and observations Datadog identified an active campaign employing fake GitHub repositories impersonating software companies and…
Linux Ransomware Vulnerabilities Windows7 Min Read January 26, 2026 Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE In recent years, Integrated Development Environments (IDEs) have become a pivotal component in modern software development, providing…
Data Breach Phishing Ransomware Windows14 Min Read January 7, 2026 Decoding the GitHub recommendations for npm maintainers The open source package distribution ecosystem in general has seen an increase in both velocity and severity of targeted attacks (both…
December 10, 2025 Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users Datadog has identified an active phishing campaign that targets organizations that use Microsoft 365 and Okta for their single sign-on (SSO)…
December 4, 2025 CVE-2025-55182 (React2Shell): Remote code execution in React Server Components and Next.js Key points and observations On December 3, a remote code code execution (RCE) vulnerability was identified in React Server Components and…
Apple Exploits Vulnerabilities Windows2 Min Read November 4, 2025 Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed Cybersecurity researchers have disclosed details of four security flaws in Microsoft Teams that could have exposed users to serious…
Linux Ransomware Vulnerabilities Windows2 Min Read October 16, 2025 Critical Samba RCE Vulnerability Enables Arbitrary Code Execution Samba has disclosed a severe remote code execution (RCE) flaw that could allow attackers to hijack Active Directory domain controllers.…
Cloud Security DDoS Vulnerabilities Windows10 Min Read October 16, 2025 October 2025 Patch Tuesday: Two Publicly Disclosed, Three Zero-Days, and Eight Critical Vulnerabilities Among 172 CVEs Microsoft has addressed 172 vulnerabilities in its October 2025 security update release, marking the highest number of vulnerabilities patched…
Exploits Mobile Security Vulnerabilities Windows2 Min Read October 16, 2025 Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature Microsoft has disclosed two critical vulnerabilities in its Windows BitLocker encryption feature, allowing attackers with physical access to…
Linux Windows2 Min Read October 16, 2025 Broadcom Shifts VMware Workstation/Fusion to Year-Based Versioning with New 25H2 Release Broadcom has recently announced a change to the versioning system of its virtualization software, VMware Workstation Pro and Fusion Pro.…
Data Breach Malware Vulnerabilities Windows3 Min Read October 16, 2025 Operation Zero Disco: Critical Cisco SNMP Flaw (CVE-2025-20352) Used to Implant Linux Rootkits on Switches researchers from Trend Research have uncovered a sophisticated campaign — dubbed “Operation Zero Disco” — in which…
Botnets Phishing Ransomware Windows2 Min Read October 15, 2025 Whisper 2FA Behind One Million Phishing Attempts Since July The phishing platform “Whisper 2FA” has rapidly become one of the most active tools used in large-scale credential theft…
DDoS Ransomware Vulnerabilities Windows2 Min Read October 15, 2025 Last Windows 10 Patch Tuesday Features Six Zero Days It’s set to be a busy October for system administrators after Microsoft issued security updates to fix 172 vulnerabilities including six…
Phishing Ransomware Vulnerabilities Windows2 Min Read October 15, 2025 Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks Microsoft has confirmed active exploitation of a critical zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan)…
Exploits Ransomware Vulnerabilities Windows2 Min Read October 15, 2025 Critical RCE Flaws CVE-2025-48983 & CVE-2025-48984 (CVSS 9.9) Found in Veeam Backup & Replication Veeam Software has released patches addressing three newly disclosed , including two critical Remote Code Execution (RCE) in Veeam Backup…
Phishing Ransomware Vulnerabilities Windows1 Min Read October 15, 2025 Chrome Fix: New Use-After-Free Flaw (CVE-2025-11756) in Safe Browsing Component Poses High Risk Google has released a new Stable Channel Update for Desktop, rolling out gradually to Windows, macOS, and Linux systems over the coming days…
DDoS Ransomware Vulnerabilities Windows3 Min Read October 15, 2025 October Patch Tuesday: Microsoft Fixes 6 Zero-Days, Including 4 Actively Exploited Flaws, as Windows 10 Reaches End-of-Life Microsoft’s October 2025 Patch Tuesday has arrived with one of the largest updates of the year—193 patched, including six…
DDoS Vulnerabilities Windows3 Min Read October 15, 2025 Rockwell Automation Patches Privilege Escalation and Denial-of-Service Flaws Across FactoryTalk and ArmorStart Systems Rockwell Automation has released a series of advisories addressing in several of its FactoryTalk and ArmorStart product lines. These ,…
Linux Ransomware Vulnerabilities Windows4 Min Read October 14, 2025 Patch Tuesday, October 2025 ‘End of 10’ Edition Microsoft today released software updates to plug a whopping 172 security holes in its Windows operating systems, including at least two…
Cloud Security Ransomware Vulnerabilities Windows4 Min Read October 14, 2025 Frightful Patch Tuesday gives admins a scare with 175+ Microsoft CVEs, 3 under attack Spooky season is in full swing, and this extends to Microsoft's October Patch Tuesday with security updates for a frightful 175 Microsoft…
Cloud Security DDoS Vulnerabilities Windows3 Min Read October 14, 2025 Patch Tuesday October 2025: Three Zero-days Under Attack Microsoft’s Patch Tuesday October 2025 included fixes for 175 vulnerabilities, including three exploited zero-days and 13 additional…
Malware Ransomware Vulnerabilities Windows3 Min Read October 14, 2025 UEFI Shell Vulnerabilities Could Let Hackers Bypass Secure Boot on 200,000+ Laptops Hackers can exploit vulnerabilities in signed UEFI shells to bypass Secure Boot protections on over 200,000 Framework laptops and desktops.…
Data Breach Ransomware Windows2 Min Read October 14, 2025 Legacy Windows Protocols Still Expose Networks to Credential Theft A new cybersecurity study has found that legacy Windows communication protocols continue to expose organizations to credential theft, even…
Android Phishing Vulnerabilities Windows2 Min Read October 14, 2025 New Pixnapping Attack Steals 2FA Codes From Google Authenticator Within 30 Seconds Pixnapping, a novel class of side-channel attacks targeting Android devices that can covertly extract sensitive screen data, including…
Exploits Phishing Vulnerabilities Windows2 Min Read October 14, 2025 Microsoft Patches Edge IE Mode After Hackers Exploited Chakra Zero-Day for Device Takeover After discovering that hackers were exploiting a zero-day in the Chakra JavaScript engine used by Internet Explorer versions 9, 10, and 11,…
Apple Linux Phishing Windows2 Min Read October 13, 2025 Hackers Target ScreenConnect Features For Network Intrusions A rise in cyber-attacks exploiting remote monitoring and management (RMM) tools for initial access via phishing has been observed by…
Apple Malware Ransomware Windows2 Min Read October 13, 2025 New Stealit Malware Campaign Spreads via VPN and Game Installer Apps Threat actors are conducting a new malicious campaign deploying the Stealit malware via disguised applications, according to Fortinet. The…
Malware Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Ransomware crims that exploited SharePoint 0-days add Velociraptor to their arsenal The ransomware gang caught exploiting Microsoft SharePoint zero-days over the summer has added a new tool to its arsenal: Velociraptor, an…
Malware Ransomware Vulnerabilities Windows2 Min Read October 10, 2025 Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances to deploy Akira…
Malware Phishing Ransomware Windows4 Min Read October 10, 2025 ‘Payroll Pirate’ Attacks Target U.S. Universities, Diverting Employee Salaries Microsoft Threat Intelligence has revealed a spate of financially motivated cyberattacks against universities across the United States. The…
Apple Vulnerabilities Windows4 Min Read October 10, 2025 October 2025 Patch Tuesday forecast: The end of a decade with Microsoft A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after…