Android Data Security3 Min Read May 6, 2026 Google's Android Apps Get Public Verification to Stop Supply Chain Attacks Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensur…
3 Min Read May 6, 2026 Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs Cybersecurity researchers have disclosed details of an intrusion that… Endpoint Security Threat Intelligence
2 Min Read May 6, 2026 Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution Palo Alto Networks has released an advisory warning that a critical… Network Security Vulnerability
2 Min Read May 5, 2026 Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE The Apache Software Foundation (ASF) has released security updates to… Server Security Vulnerability
Network Security Vulnerability2 Min Read December 13, 2025 CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink ALEOS…
Vulnerability Zero-Day2 Min Read December 13, 2025 Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security…
Cryptocurrency Malware4 Min Read December 12, 2025 Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a…
Email Security Malware6 Min Read December 12, 2025 New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable…
Browser Security Data Protection6 Min Read December 12, 2025 Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions…
Software Security Vulnerability2 Min Read December 12, 2025 New React RSC Vulnerabilities Enable DoS and Source Code Exposure The React team has released fixes for two new types of flaws in React Server Components (RSC) that, if successfully exploited, could result in…
Threat Intelligence Vulnerability3 Min Read December 12, 2025 React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell vulnerability by…
Server Security Vulnerability2 Min Read December 12, 2025 CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo GeoServer to…
Data Breach Malware Ransomware Vulnerabilities15 Min Read December 11, 2025 ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories This week's cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons,…
Cyber Espionage Windows Security2 Min Read December 11, 2025 NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for…
Automation Compliance4 Min Read December 11, 2025 The Impact of Robotic Process Automation (RPA) on Identity and Access Management As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a powerful tool…
Cyberwarfare Threat Intelligence3 Min Read December 11, 2025 WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities across the…
Cloud Security Vulnerability3 Min Read December 11, 2025 Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances…
Vulnerability Zero-Day2 Min Read December 11, 2025 Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under…
Encryption Vulnerability3 Min Read December 11, 2025 Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution Huntress is warning of a new actively exploited vulnerability in Gladinet's CentreStack and Triofox products stemming from the use of…
Botnet Vulnerability4 Min Read December 10, 2025 React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server…
Enterprise Security Web Services2 Min Read December 10, 2025 .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to…
Anti-Malware Research6 Min Read December 10, 2025 Fake Leonardo DiCaprio Movie Torrent Drops Agent Tesla Through Layered PowerShell Chain After noticing a spike in detections involving what looked like a movie torrent for One Battle After Another, Bitdefender researchers started…
Hardware Security Vulnerability2 Min Read December 10, 2025 Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE)…
Cloud Security Threat Detection2 Min Read December 10, 2025 Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations,…
Malware Vulnerability3 Min Read December 10, 2025 Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and…
Patch Tuesday Vulnerability4 Min Read December 10, 2025 Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that…
Endpoint Security Vulnerability4 Min Read December 10, 2025 Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an…
December 10, 2025 Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users Datadog has identified an active phishing campaign that targets organizations that use Microsoft 365 and Okta for their single sign-on (SSO)…
Malware Vulnerability4 Min Read December 9, 2025 North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical React2Shell security flaw in…
Endpoint Security Ransomware2 Min Read December 9, 2025 Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced…
Security Automation Zero Trust5 Min Read December 9, 2025 How to Streamline Zero Trust Using the Shared Signals Framework Zero Trust helps organizations shrink their attack surface and respond to threats faster, but many still struggle to implement it because…
Artificial Intelligence Browser Security4 Min Read December 9, 2025 Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats Google on Monday announced a set of new security features in Chrome, following the company's addition of agentic artificial intelligence (AI)…
IoT Research3 Min Read December 9, 2025 CVE-2025-55182 Exploitation Hits the Smart Home Shortly after details of CVE-2025-55182 became public, we began noticing large volumes of exploitation attempts across our endpoint and…
Cybersecurity Hacking News14 Min Read December 8, 2025 ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More It's been a week of chaos in code and calm in headlines. A bug that broke the internet's favorite framework, hackers chasing AI tools, fake…
Cybersecurity Password Security3 Min Read December 8, 2025 How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year? The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run lean, and attackers time automated campaigns…
Malware Mobile Security4 Min Read December 8, 2025 Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features Cybersecurity researchers have disclosed details of two new Android malware families dubbed FvncBot and SeedSnatcher, as another upgraded…
AI Security Vulnerability5 Min Read December 6, 2025 Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks Over 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments…
Patch Management Vulnerability3 Min Read December 6, 2025 Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server…
Email Security Threat Research3 Min Read December 5, 2025 Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails A new agentic browser attack targeting Perplexity's Comet browser that's capable of turning a seemingly innocuous email into a destructive…
Application Security Vulnerability2 Min Read December 5, 2025 Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch A critical security flaw has been disclosed in Apache Tika that could result in an XML external entity (XXE) injection attack. The…
Software Security Vulnerability2 Min Read December 5, 2025 Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability Two hacking groups with ties to China have been observed weaponizing the newly disclosed security flaw in React Server Components (RSC) within…
Mobile Security Zero Day5 Min Read December 5, 2025 Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery A human rights lawyer from Pakistan's Balochistan province received a suspicious link on WhatsApp from an unknown number, marking the first…
Business Continuity Compliance4 Min Read December 5, 2025 "Getting to Yes": An Anti-Sales Guide for MSPs Most MSPs and MSSPs know how to deliver effective security. The challenge is helping prospects understand why it matters in business terms.…
Network Security Zero-Day5 Min Read December 5, 2025 CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of a backdoor named BRICKSTORM that has been put…
Network Security Vulnerability2 Min Read December 5, 2025 JPCERT Confirms Active Command Injection Attacks on Array AG Gateways A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025,…
Cybercrime Endpoint Security3 Min Read December 4, 2025 Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China The threat actor known as Silver Fox has been spotted orchestrating a false flag operation to mimic a Russian threat group in attacks…