Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read February 4, 2026 Orchid Security Introduces Continuous Identity Observability for Enterprise Applications An innovative approach to discovering, analyzing, and governing identity… Identity Security Security Operations
2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw… Open Source Vulnerability
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
Data Breach Ransomware Social Engineering2 Min Read October 7, 2025 Discord Reveals Data Breach Following Third-Party Compromise Discord has revealed it has been targeted by a ransomware actor who has accessed customer data, including proof of age ID and billing…
Cybersecurity Mic-E-Mouse Security Vulnerability2 Min Read October 7, 2025 New Mic-E-Mouse Attack Shows Computer Mice Can Capture Conversations A team of researchers from the University of California, Irvine, has discovered a security risk right on your desk. It turns out that your…
Cloud Security Ransomware Vulnerabilities Windows2 Min Read October 7, 2025 GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware A critical deserialization flaw in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035, has already been weaponized by the…
Data Breach Exploits Ransomware Vulnerabilities2 Min Read October 7, 2025 NCSC: Patch Critical Oracle EBS Bug Now Oracle E-Business Suite (EBS) customers have been urged to patch a critical vulnerability in the product, after reports that the…
Data Breach Vulnerabilities2 Min Read October 7, 2025 Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Elastic has released a security advisory detailing a medium-severity vulnerability in the Kibana CrowdStrike Connector that could allow for…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 7, 2025 Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Campaign A vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) tool with a CVSS score of 10.0 is being actively exploited in…
Cloud Security Vulnerability2 Min Read October 7, 2025 13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result in remote code execution…
Botnet Cryptojacking cve-2025-49844 exploit Malware rce2 Min Read October 7, 2025 13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result in remote code execution…
Cloud Security Vulnerability2 Min Read October 7, 2025 Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere…
C2 CloudFlare command-and-control CVE-2025-10035 exploit Malware Microsoft Ransomware rce Windows2 Min Read October 7, 2025 Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere…
CVE-2025-61882 exploit proof-of-concept Ransomware rce Zero-Day2 Min Read October 7, 2025 Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks CrowdStrike on Monday said it’s attributing the exploitation of a recently disclosed security flaw in Oracle E-Business Suite with…
Breach conti leak leaked Ransomware3 Min Read October 6, 2025 Red Hat data breach escalates as ShinyHunters joins extortion Enterprise software giant Red Hat is now being extorted by the ShinyHunters gang, with samples of stolen customer engagement reports…
Cloud Security Ransomware Zero Trust3 Min Read October 6, 2025 What Security Teams Are Looking for in Identity Management Today Identity management gives organizations better visibility and control over their identity infrastructure – if they use the right…
Akira Black Basta CVE-2025-10035 exploit IoT Microsoft Ransomware Zero-Day2 Min Read October 6, 2025 Microsoft: Critical GoAnywhere bug exploited in ransomware attacks A cybercrime group, tracked as Storm-1175, has been actively exploiting a maximum severity GoAnywhere MFT vulnerability in Medusa ransomware…
Android Malware ProSpy Scam Security Signal Social Engineering Spyware ToSpy ToTok UAE2 Min Read October 6, 2025 Spyware Disguised as Signal and ToTok Apps Targets UAE Android Users If you use messaging apps in the United Arab Emirates (UAE), cybersecurity researchers at ESET have identified two mobile spyware campaigns…
Microsoft Windows2 Min Read October 6, 2025 Microsoft: Running multiple Office apps causes Copilot issues Microsoft is investigating a bug that causes Copilot issues when multiple Office apps are running simultaneously on the same system. According…
AWS Google Cloud Kernel Kubernetes Linux Microsoft rce Zeroday2 Min Read October 6, 2025 Zeroday Cloud hacking contest offers $4.5 million in bounties A new hacking competition called Zeroday Cloud, focused on open-source cloud and AI tools, announced a total prize pool of $4.5…
Mobile2 Min Read October 6, 2025 ChatGPT Pulse is coming to the web, but no word on free or Plus roll out OpenAI’s ChatGPT Pulse, which is a tool that gives you personalised updates based on usage patterns, is coming to the web. OpenAI began…
leaked2 Min Read October 6, 2025 OpenAI is testing ChatGPT-powered Agent Builder OpenAI is building a tool that will allow you to create your own AI Agents. AI startups are convinced AI agents are the future and…
Press Release2 Min Read October 6, 2025 Reemo Unveils Bastion+: A Scalable Solution for Global Privileged Access Management Paris, France, October 6th, 2025, CyberNewsWire Reemo continues its mission to secure enterprise remote access and becomes the first French…
backdoor Botnet cve-2025-49844 exploit Malware Microsoft Ransomware3 Min Read October 6, 2025 Redis warns of critical flaw impacting thousands of instances The Redis security team has released patches for a maximum severity vulnerability that could allow attackers to gain remote code execution on…
Uncategorized2 Min Read October 6, 2025 Europol Calls for Stronger Data Laws to Combat Cybercrime Criminals are exploiting encryption, anonymization and new technologies faster than regulators and law enforcement can adapt, creating a…
Data Breach DDoS Phishing Ransomware3 Min Read October 6, 2025 Ransomware Group “Trinity of Chaos” Launches Data Leak Site A new data leak site hosted on the TOR network has been launched by the “Trinity of Chaos” – a ransomware collective…
conti Microsoft2 Min Read October 6, 2025 LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data LinkedIn has filed a lawsuit against Delaware company ProAPIs Inc. and its founder and CTO, Rehmat Alam, for allegedly scraping legitimate…
Cyber Espionage Network Security3 Min Read October 6, 2025 New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the…
Android Malware Mobile TROJAN VPN3 Min Read October 6, 2025 New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the…
Android CVE-2025-59489 iOS Linux macOS Microsoft Mobile privilege escalation Windows3 Min Read October 6, 2025 Steam and Microsoft warn of Unity flaw exposing gamers to attacks A code execution vulnerability in the Unity game engine could be exploited to achieve code execution on Android and privilege escalation on…
Security4 Min Read October 6, 2025 XWorm malware resurfaces with ransomware module, over 35 plugins New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project…
Cybersecurity Hacking News20 Min Read October 6, 2025 ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Artificial Intelligence Data Protection4 Min Read October 6, 2025 5 Critical Questions For Adopting an AI Security Solution In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security…
Akira Android Apple Artificial Intelligence AWS Azure backdoor C2 CloudFlare command-and-control conti CVE-2021-43798 CVE-2023-21563 cve-2023-24932 CVE-2024-58260 CVE-2025-10547 CVE-2025-10725 CVE-2025-27915 cve-2025-30247 cve-2025-4008 CVE-2025-41250 CVE-2025-41251 CVE-2025-41252 CVE-2025-43400 cve-2025-49844 CVE-2025-52906 CVE-2025-57714 CVE-2025-59934 CVE-2025-59951 CVE-2025-61882 CVE-2025-9230 CVE-2025-9231 CVE-2025-9232 DDoS denial-of-service exploit firewall Google Cloud ics identity iOS leak macOS Malware Microsoft Mobile Nation-state PCI-DSS Phishing Privacy privilege escalation Ransomware Social Engineering Software Supply Chain spam Spyware state-sponsored Stealer VPN Windows XSS Zero-Day2 Min Read October 6, 2025 Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
AI model Artificial Intelligence AWS Azure conti exposure GDPR Google Cloud HIPAA identity machine learning ML Privacy Zero Trust4 Min Read October 6, 2025 5 Critical Questions For Adopting an AI Security Solution In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security…
Threat Intelligence Vulnerability2 Min Read October 6, 2025 Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle has released an emergency update to address a critical security flaw in its E-Business Suite software that it said has been exploited…
Android Apple backdoor C2 Cisco command-and-control Malware Microsoft Mobile VPN Windows2 Min Read October 6, 2025 Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine…
Akira Cisco conti exploit firewall Malware Palo Alto Ransomware Social Engineering VPN2 Min Read October 6, 2025 Scanning of Palo Alto Portals Surges 500% Security experts have observed a massive increase in reconnaissance activity targeted at login portals for Palo Alto Networks products.…
Ransomware2 Min Read October 6, 2025 Asahi Confirms Ransomware Attack, Data Stolen from Servers Asahi has confirmed it has been the victim of a ransomware attack, resulting in an “unauthorized transfer of data” from its…
Breach conti Phishing Ransomware Supply Chain2 Min Read October 6, 2025 Renault Informs Customers of Supply Chain Data Breach Carmaker Renault has been forced to notify an unspecified number of customers that their personal data may have been compromised by threat…
apt28 CVE-2025-27915 ics Stealer XSS Zero-Day2 Min Read October 6, 2025 Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the…
conti CVE-2025-61882 exploit Google Cloud Ransomware Zero-Day2 Min Read October 6, 2025 Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that it said has been exploited in the…
Clop conti CVE-2024-50623 CVE-2024-55956 CVE-2025-61882 exploit Google Cloud leaked PoC Ransomware security update Zero-Day4 Min Read October 6, 2025 Oracle patches EBS zero-day exploited in Clop data theft attacks Oracle is warning about a critical E-Business Suite zero-day vulnerability tracked as CVE-2025-61882 that allows attackers to perform…
CVE-2025-27915 exploit ics XSS Zero-Day3 Min Read October 5, 2025 Hackers exploited Zimbra flaw as zero-day using iCalendar files Researchers monitoring for larger .ICS calendar attachments found that a flaw in Zimbra Collaboration Suite (ZCS) was used in…
Ransomware Supply Chain5 Min Read October 5, 2025 How Can IT Security Professionals Best Navigate the CMMC Maze? For companies still treating the Cybersecurity Maturity Model Certification (CMMC) as an IT-only concern, the risks are growing. Developed by…