Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read February 4, 2026 Orchid Security Introduces Continuous Identity Observability for Enterprise Applications An innovative approach to discovering, analyzing, and governing identity… Identity Security Security Operations
2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw… Open Source Vulnerability
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
Microsoft Security2 Min Read October 13, 2025 Microsoft restricts IE mode access in Edge after zero-day attacks Microsoft is restricting access to Internet Explorer mode in Edge browser after learning that hackers are leveraging zero-day exploits in…
Healthcare Security2 Min Read October 13, 2025 SimonMed says 1.2 million patients impacted in January data breach U.S. medical imaging provider SimonMed Imaging is notifying more than 1.2 million individuals of a data breach that exposed their sensitive…
Security2 Min Read October 13, 2025 Massive multi-country botnet targets RDP services in the US A large-scale botnet is targeting Remote Desktop Protocol (RDP) services in the United States from more than 100,000 IP addresses. The…
Security2 Min Read October 13, 2025 SonicWall VPN accounts breached using stolen creds in widespread attacks Researchers warn that threat actors have compromised more than a hundred SonicWall SSLVPN accounts in a large-scale campaign using stolen,…
Microsoft2 Min Read October 13, 2025 Microsoft investigates outage affecting Microsoft 365 apps Microsoft is investigating an ongoing incident that is preventing some customers from accessing Microsoft 365 applications. While the company…
Apple Linux Phishing Windows2 Min Read October 13, 2025 Hackers Target ScreenConnect Features For Network Intrusions A rise in cyber-attacks exploiting remote monitoring and management (RMM) tools for initial access via phishing has been observed by…
Artificial Intelligence Cybercrime Data Breach Featured Phishing Popular Ransomware Vulnerabilities4 Min Read October 13, 2025 AI vs AI: The Future of Cybersecurity Is Machine vs. Machine. Is the human factor still relevant? How Artificial Intelligence is transforming both cyber defense and cybercrime by Venkatesh Apsingekar, Senior Engineering Manager –…
Phishing Vulnerabilities4 Min Read October 13, 2025 Your Alerts Are Increasing Your Cybersecurity Risk At their core, alerts exist to bring attention to something meaningful: an indicator of compromise (IOC), an indicator of attack (IOA), or a…
Android Malware Phishing Ransomware2 Min Read October 13, 2025 Spain Arrests Alleged Leader of GXC Team Cybercrime Network Spanish authorities have arrested a 25-year-old Brazilian national accused of leading the “GXC Team” – a…
Security2 Min Read October 13, 2025 Oracle releases emergency patch for new E-Business Suite flaw Oracle has issued an emergency security update over the weekend to patch another E-Business Suite (EBS) vulnerability that can be exploited…
Apple Malware Ransomware Windows2 Min Read October 13, 2025 New Stealit Malware Campaign Spreads via VPN and Game Installer Apps Threat actors are conducting a new malicious campaign deploying the Stealit malware via disguised applications, according to Fortinet. The…
Microsoft2 Min Read October 13, 2025 Microsoft: Windows 11 Media Creation Tool broken on Windows 10 PCs Microsoft says the latest version of the Windows 11 Media Creation Tool (MCT) no longer works correctly on Windows 10 22H2 computers. The…
Cybersecurity Hacking News2 Min Read October 13, 2025 Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More Every week, the cyber world reminds us that silence doesn't mean safety. Attacks often begin quietly — one unpatched flaw, one…
Data Breach Ransomware4 Min Read October 13, 2025 Is Hacking Back Ever a Good Strategy? Hacking back aims to retaliate against cyberattackers by launching a counterattack to disrupt their systems, recover stolen data or send a…
Threat Detection Web Security5 Min Read October 13, 2025 Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk Think your WAF has you covered? Think again. This holiday season, unmonitored JavaScript is a critical oversight allowing attackers to steal…
Security2 Min Read October 13, 2025 Harvard investigating breach linked to Oracle zero-day exploit Harvard University is investigating a data breach after the Clop ransomware gang listed the school on its data leak site, saying the alleged…
Botnet Network Security2 Min Read October 13, 2025 Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over 30…
Browser Security Windows Security2 Min Read October 13, 2025 Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor Microsoft said it has revamped the Internet Explorer (IE) mode in its Edge browser after receiving "credible reports" in August 2025 that…
Cloud Security Malware Ransomware Vulnerabilities2 Min Read October 13, 2025 Apple Bug Bounty Payouts Can Now Top $5m Apple has doubled its top award for ethical hacking discoveries to $2m, although security researchers could earn even more if they’re…
Data Breach Ransomware3 Min Read October 13, 2025 FBI and French Police Shutter BreachForums Domain Again The FBI and French investigators have seized at least one domain for a popular cybercrime forum being used as a leak site in connection with…
Financial Security Malware2 Min Read October 13, 2025 Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs GitHub as a backbone…
Ransomware Windows Security2 Min Read October 13, 2025 New Rust-Based Malware "ChaosBot" Uses Discord Channels to Control Victims' PCs Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct…
Threat Intelligence Vulnerability1 Min Read October 12, 2025 New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow…
Uncategorized3 Min Read October 12, 2025 Is CMMC 3.0 on the Horizon? How Defense Contractors Can Prepare Now The Department of Defense recently sent defense contractors a clear signal: an update to the recently finalized CMMC 2.0 is likely coming and…
Security2 Min Read October 12, 2025 Fake 'Inflation Refund' texts target New Yorkers in new scam An ongoing smishing campaign is targeting New Yorkers with text messages posing as the Department of Taxation and Finance, claiming to offer…
Data Breach Exploits Supply Chain Vulnerabilities2 Min Read October 12, 2025 Critical Vulnerability CVE-2025-61884 Found in Oracle E-Business Suite Oracle E-Business Suite (EBS) — a cornerstone ERP platform for countless enterprises across the globe — faces a critical security…
Insider Threats Malware Mobile Security4 Min Read October 12, 2025 In Defense of Good Bots: Good Bots Exist, But Only When We Build Them That Way The word “bot” doesn’t have the best reputation right now. You hear it and think of election manipulation, fake social media…
Data Breach Exploits Vulnerabilities1 Min Read October 12, 2025 Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884) Oracle has revealed the existence of yet another remotely exploitable Oracle E-Business Suite vulnerability (CVE-2025-61884). About…
Data Breach Phishing Ransomware Vulnerabilities7 Min Read October 12, 2025 Week in review: Hackers extorting Salesforce, CentreStack 0-day exploited Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How to get better results from…
Legal Security2 Min Read October 11, 2025 Spain dismantles “GXC Team” cybercrime syndicate, arrests leader Spanish Guardia Civil have dismantled the “GXC Team” cybercrime operation and arrested its alleged leader, a 25-year-old…
Cloud Security Network Security2 Min Read October 11, 2025 Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts Cybersecurity company Huntress on Friday warned of "widespread compromise" of SonicWall SSL VPN devices to access multiple customer…
Network Security Vulnerability3 Min Read October 11, 2025 Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with ransomware…
Data Breach Phishing Ransomware Vulnerabilities4 Min Read October 11, 2025 Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM) In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses…
DDoS Malware Phishing Vulnerabilities2 Min Read October 11, 2025 Two 7-Zip Flaws Allow Code Execution via Malicious ZIP Files (CVE-2025-11001 & CVE-2025-11002) The Zero Day Initiative (ZDI) has published details of two critical in the popular open-source compression utility 7-Zip, which could allow…
Supply Chain Vulnerabilities2 Min Read October 11, 2025 China Launches Antitrust Probe into Qualcomm Over Autotalks Acquisition Failure to File Declaration China’s State Administration for Market Regulation (SAMR) recently announced the launch of an antitrust investigation into U.S.…
DDoS Network Vulnerabilities Web Security2 Min Read October 11, 2025 Juniper Junos Space October 2025 Vulnerability Fixes On October 9, 2025, Juniper Networks rolled out Junos Space 24.1R4 Patch V1, a broad security update tackling more than 200 vulnerabilities…
Microsoft2 Min Read October 10, 2025 Windows 11 23H2 Home and Pro reach end of support in 30 days Microsoft has reminded customers again today that systems running Home and Pro editions of Windows 11 23H2 will stop receiving security…
Security2 Min Read October 10, 2025 Hackers exploiting zero-day in Gladinet file sharing software Threat actors are exploiting a zero-day vulnerability (CVE-2025-11371) in Gladinet CentreStack and Triofox products, which allows a local…
Security2 Min Read October 10, 2025 Cybersecurity For Dummies, 3rd Edition eBook FREE for a Limited Time In today's hyper-connected world, cyber threats are more sophisticated and frequent than ever - ransomware attacks, data breaches, social…
Malware Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Ransomware crims that exploited SharePoint 0-days add Velociraptor to their arsenal The ransomware gang caught exploiting Microsoft SharePoint zero-days over the summer has added a new tool to its arsenal: Velociraptor, an…
Google2 Min Read October 10, 2025 Google Chrome to revoke notification access for inactive sites Google is updating the Chrome web browser to automatically revoke notification permissions for websites that haven't been visited recently, to…
Security2 Min Read October 10, 2025 Apple now offers $2 million for zero-click RCE vulnerabilities Apple is announcing a major expansion and redesign of its bug bounty program, doubling maximum payouts, adding new research categories,…