Cyber Espionage Threat Intelligence3 Min Read March 21, 2026 FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging applications (CMAs) like …
1 Min Read March 21, 2026 Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager Oracle has released security updates to address a critical security flaw… Threat Intelligence Vulnerability
4 Min Read March 21, 2026 Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages The threat actors behind the supply chain attack targeting the popular… Malware Threat Intelligence
3 Min Read March 21, 2026 CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on… Threat Intelligence Vulnerability
Threat Intelligence Vulnerability3 Min Read October 31, 2025 CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from…
Malware Secure Coding2 Min Read October 31, 2025 Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were…
Cyber Attack Vulnerability2 Min Read October 31, 2025 CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Broadcom VMware…
Endpoint Security Network Security3 Min Read October 31, 2025 A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do A design firm is editing a new campaign video on a MacBook Pro. The creative director opens a collaboration app that quietly requests…
Artificial Intelligence Mobile Security4 Min Read October 30, 2025 Google's Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month Google on Thursday revealed that the scam defenses built into Android safeguard users around the world from more than 10 billion suspected…
Cybercrime Malware2 Min Read October 30, 2025 Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are…
Browser Security Vulnerability2 Min Read October 30, 2025 New "Brash" Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL A severe vulnerability disclosed in Chromium's Blink rendering engine can be exploited to crash many Chromium-based browsers within a few…
AI Security Breach Simulation6 Min Read October 30, 2025 The Death of the Security Checkbox: BAS Is the Power Behind Real Defense Security doesn't fail at the point of breach. It fails at the point of impact. That line set the tone for this year's Picus Breach and…
Cybersecurity Hacking News12 Min Read October 30, 2025 ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact…
DevSecOps Software Security2 Min Read October 30, 2025 PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs Cybersecurity researchers have uncovered yet another active software supply chain attack campaign targeting the npm registry with over 100…
Internet of Things Vulnerability3 Min Read October 29, 2025 Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices Cybersecurity researchers are calling attention to a spike in automated attacks targeting PHP servers, IoT devices, and cloud gateways by…
AI Safety machine learning2 Min Read October 29, 2025 New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts Cybersecurity researchers have flagged a new security issue in agentic web browsers like OpenAI ChatGPT Atlas that exposes underlying…
Artificial Intelligence Data Breach4 Min Read October 29, 2025 Preparing for the Digital Battlefield of 2026: Ghost Identities, Poisoned Accounts, & AI Agent Havoc BeyondTrust's annual cybersecurity predictions point to a year where old defenses will fail quietly, and new attack vectors will surge.…
Cyber Espionage Vulnerability4 Min Read October 29, 2025 Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics Organizations in Ukraine have been targeted by threat actors of Russian origin with an aim to siphon sensitive data and maintain persistent…
Artificial Intelligence Compliance2 Min Read October 29, 2025 Discover Practical AI Tactics for GRC — Join the Free Expert Webinar Artificial Intelligence (AI) is rapidly transforming Governance, Risk, and Compliance (GRC). It's no longer a future concept—it's here,…
Malware Threat Intelligence2 Min Read October 29, 2025 10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux Cybersecurity researchers have discovered a set of 10 malicious npm packages that are designed to deliver an information stealer targeting…
Malware Vulnerability2 Min Read October 29, 2025 Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack Threat actors are actively exploiting multiple security flaws impacting Dassault Systèmes DELMIA Apriso and XWiki, according to alerts…
Encryption Hardware Security3 Min Read October 28, 2025 New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves A group of academic researchers from Georgia Tech, Purdue University, and Synkhronix have developed a side-channel attack called TEE.Fail that…
Malware Mobile Security2 Min Read October 28, 2025 New Android Trojan 'Herodotus' Outsmarts Anti-Fraud Systems by Typing Like a Human Cybersecurity researchers have disclosed details of a new Android banking trojan called Herodotus that has been observed in active campaigns…
Data Breach Malware6 Min Read October 28, 2025 Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns tracked as GhostCall…
SOC Operations Threat Intelligence4 Min Read October 28, 2025 Why Early Threat Detection Is a Must for Long-Term Business Growth In cybersecurity, speed isn't just a win — it's a multiplier. The faster you learn about emerging threats, the faster you adapt your…
Cloud Security Data Protection5 Min Read October 28, 2025 Is Your Google Workspace as Secure as You Think it is? The New Reality for Lean Security Teams If you're the first security or IT hire at a fast-growing startup, you've likely inherited a mandate…
Malware Vulnerability4 Min Read October 28, 2025 Chrome Zero-Day Exploited to Deliver Italian Memento Labs' LeetAgent Spyware The zero-day exploitation of a now-patched security flaw in Google Chrome led to the distribution of an espionage-related tool from Italian…
Cyber Espionage Malware3 Min Read October 28, 2025 SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats A European embassy located in the Indian capital of New Delhi, as well as multiple organizations in Sri Lanka, Pakistan, and Bangladesh, have…
Authentication Data Protection2 Min Read October 27, 2025 X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts Social media platform X is urging users who have enrolled for two-factor authentication (2FA) using passkeys and hardware security keys like…
Artificial Intelligence Vulnerability3 Min Read October 27, 2025 New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands Cybersecurity researchers have discovered a new vulnerability in OpenAI's ChatGPT Atlas web browser that could allow malicious actors to…
Cybersecurity Hacking News22 Min Read October 27, 2025 ⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen…
Ransomware Threat Intelligence3 Min Read October 27, 2025 Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every month since the start…
AI Security Vulnerability4 Min Read October 27, 2025 ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands The newly released OpenAI Atlas web browser has been found to be susceptible to a prompt injection attack where its omnibox can be jailbroken…
Cybercrime Data Breach3 Min Read October 24, 2025 Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1,…
Network Security Vulnerability1 Min Read October 24, 2025 Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability…
Cyber Espionage Malware3 Min Read October 24, 2025 APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a…
Cyber Resilience Data Protection1 Min Read October 24, 2025 The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently Does your organization suffer from a cybersecurity perception gap? Findings from the Bitdefender 2025 Cybersecurity Assessment suggest the…
Hacking News Malware3 Min Read October 24, 2025 3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing…
DevOps Malware3 Min Read October 24, 2025 Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX…
Cyber Espionage Threat Intelligence2 Min Read October 23, 2025 North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense…
Artificial Intelligence Data Protection2 Min Read October 23, 2025 Secure AI at Scale and Speed — Learn the Framework in this Free Webinar AI is everywhere—and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you're in security, that…
Cybersecurity Hacking News3 Min Read October 23, 2025 ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse…
Data Protection DevOps2 Min Read October 23, 2025 Why Organizations Are Abandoning Static Secrets for Managed Identities As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials.…
Cloud Security Financial Crime2 Min Read October 23, 2025 “Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments…
Data Breach Vulnerability2 Min Read October 23, 2025 Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw E-commerce security company Sansec has warned that threat actors have begun to exploit a recently disclosed security vulnerability in Adobe…
Threat Intelligence Vulnerability1 Min Read October 23, 2025 Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint…