Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read February 4, 2026 Orchid Security Introduces Continuous Identity Observability for Enterprise Applications An innovative approach to discovering, analyzing, and governing identity… Identity Security Security Operations
2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw… Open Source Vulnerability
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
Breach leaked Mobile Phishing4 Min Read October 5, 2025 ParkMobile pays… $1 each for 2021 data breach that hit 22 million ParkMobile has finally wrapped up a class action lawsuit over the platform’s 2021 data breach that hit 22 million users. But…
Malware Phishing Ransomware Vulnerabilities8 Min Read October 5, 2025 Week in review: Many Cisco ASA firewalls still unsecure, hackers claim Red Hat’s GitLab breach Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How…
Apple Linux Vulnerabilities Windows2 Min Read October 5, 2025 Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used…
Data Breach Network Ransomware Vulnerabilities5 Min Read October 5, 2025 Addressing the CL0P Extortion Campaign Targeting Oracle E-Business Suite (EBS) Users Cybereason is continuing to investigate. Check the Cybereason blog for additional updates. Overview and What Cybereason Knows So Far…
Hardware Technology2 Min Read October 4, 2025 Leaked Apple iPad Pro M5 benchmark shows massive improvements A new leaked benchmark shows Apple's alleged M5 chip on an iPad, and it's almost as fast as a desktop CPU. We know that Apple is really good…
Artificial Intelligence Technology1 Min Read October 4, 2025 ChatGPT social could be a thing, as leak shows direct messages support OpenAI doesn't want ChatGPT to remain just a chatbot for interacting with a large language model. OpenAI already has Sora 2, which has a…
Artificial Intelligence1 Min Read October 4, 2025 OpenAI rolls out GPT Codex Alpha with early access to new models OpenAI's Codex is already making waves in the vibe coding vertical, and it's now set to get even better. For those unaware, Codex runs in…
Artificial Intelligence1 Min Read October 4, 2025 OpenAI wants ChatGPT to be your emotional support GPT-5 isn't as good as GPT-4o when it comes to emotional support, but that changes today. As first spotted by BleepingComputer, ChatGPT has…
Artificial Intelligence Technology1 Min Read October 4, 2025 OpenAI prepares $4 ChatGPT Go for several new countries OpenAI has been testing a new, cheaper ChatGPT plan called "Go," and it's now rolling out to more regions. We previously thought it…
Linux Malware Vulnerabilities Windows3 Min Read October 4, 2025 500X Surge in Scanning Targets Palo Alto and Cisco ASA Enterprise security teams are on high alert after an extraordinary 500% spike in mass scanning activity was detected against Palo Alto…
Agentic AI Enterprise Security2 Min Read October 4, 2025 CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity's agentic AI browser Comet by…
Security2 Min Read October 4, 2025 Massive surge in scans targeting Palo Alto Networks login portals A spike in suspicious scans targeting Palo Alto Networks login portals indicates clear reconnaissance efforts from suspicious IP addresses,…
Data Breach Network Ransomware Vulnerabilities3 Min Read October 4, 2025 Breaking Point: Storage & Backup Systems Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems Enterprise storage and backup systems have become a…
Android Apple Network Vulnerabilities3 Min Read October 4, 2025 New Study Warns Several Free iOS and Android VPN Apps Leak Data Millions who rely on free mobile Virtual Private Network (VPN) apps for online privacy may actually be putting their data at greater risk,…
Security3 Min Read October 4, 2025 Discord discloses data breach after hackers steal support tickets Hackers stole partial payment information and personally identifiable data, including names and government-issued IDs, from some Discord users…
Security2 Min Read October 4, 2025 Hackers steal identifiable Discord user data in third-party breach Hackers stole partial payment information and personally identifying data associated with some Discord users after compromising a third-party…
Network Security Vulnerability1 Min Read October 4, 2025 Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login…
Ransomware Supply Chain Vulnerabilities2 Min Read October 4, 2025 Clop Ransomware Targets Oracle E-Business Suite: Extortion Wave Hits Global Enterprises A new wave of extortion attacks linked to the Clop ransomware group has recently shaken organizations using Oracle E-Business Suite (EBS),…
Artificial Intelligence Technology1 Min Read October 3, 2025 Opera wants you to pay $19.90 per month for its new AI browser Opera Neon is a new browser that puts AI in control of your tabs and browsing activities, but it'll cost $19.90 per month. The AI wave is…
Botnet Malware4 Min Read October 3, 2025 Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That's…
Cyber Attack Cyber Crime Cybersecurity Extortion Ransom Security3 Min Read October 3, 2025 Scattered LAPSUS$ Hunters Claim Salesforce Breach, 1B Records, 39 Firms Listed A new leak site has gone live, operated by the notorious group calling itself “Scattered Lapsus$ Hunters,” (a coalition that…
Security2 Min Read October 3, 2025 Signal adds new cryptographic defense against quantum attacks Signal announced the introduction of Sparse Post-Quantum Ratchet (SPQR), a new cryptographic component designed to withstand quantum computing…
AI adoption metrics AI governance Black Hat 2025 CIO and CISO alignment Continuous Monitoring Ransomware Spotlight3 Min Read October 3, 2025 Innovator Spotlight: Singulr AI The AI Governance Tightrope: Enabling Innovation Without Compromising Security Cybersecurity leaders are facing a critical inflection…
ICS/OT Malware Ransomware Vulnerabilities2 Min Read October 3, 2025 Global Exposure of 180,000 ICS/OT Devices Raises Safety Concerns The cybersecurity firm Bitsight has issued a major warning about a rapid increase in critical systems left vulnerable on the public internet.…
Cybercrime Malware4 Min Read October 3, 2025 Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as…
Security2 Min Read October 3, 2025 Renault and Dacia UK warn of data breach impacting customers Customers of Renault and Dacia in the United Kingdom have been notified that sensitive information they shared with the car maker was…
Insider Threats Malware Ransomware5 Min Read October 3, 2025 AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense Quick Summary: AI agents enable security teams to surge ahead of the most advanced threats using automated decision-making, real…
Android Apple Malware Vulnerabilities2 Min Read October 3, 2025 Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud A Chinese-speaking cybercrime group is hijacking trusted Internet Information Services (IIS) worldwide to run SEO scams that redirect users to…
Security2 Min Read October 3, 2025 Japanese beer giant Asahi confirms ransomware attack Japanese beer-making giant Asahi has disclosed today that a ransomware attack caused the IT disruptions that forced it to shut down factories…
Security3 Min Read October 3, 2025 ShinyHunters launches Salesforce data leak site to extort 39 victims An extortion group has launched a new data leak site to publicly extort dozens of companies impacted by a wave of Salesforce breaches,…
Artificial Intelligence Security Software3 Min Read October 3, 2025 CommetJacking attack tricks Comet browser into stealing emails A new attack called 'CometJacking' exploits URL parameters to pass to Perplexity's Comet AI browser hidden instructions that allow…
Cloud Security Phishing Vulnerabilities4 Min Read October 3, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 40 The Good | UK Convicts “Bitcoin Queen” in World’s Largest Cryptocurrency Seizure This week, a court in the UK convicted…
Ransomware Supply Chain7 Min Read October 3, 2025 Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing In today’s interconnected digital landscape, businesses are more dependent than ever on third-party vendors and partners. While these…
Cl0p Cyber Attack Cyber Attacks Cyber Crime Cybersecurity FIN11 Google Mandiant Ransomware Security2 Min Read October 3, 2025 Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers Cybersecurity experts are on high alert as a group claiming ties to the infamous Cl0p ransomware gang is bombarding companies with emails that…
Security2 Min Read October 3, 2025 Oracle links Clop extortion attacks to July 2025 vulnerabilities Oracle has linked an ongoing extortion campaign claimed by the Clop ransomware gang to E-Business Suite (EBS) vulnerabilities that were…
Malware Online Security2 Min Read October 3, 2025 Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp. The…
Exploits Vulnerabilities2 Min Read October 3, 2025 Hackers Attempting to Exploit Grafana Vulnerability that Enables Arbitrary File Reads Grafana, the popular open-source analytics and visualization platform, has once again become the target of a large‐scale, coordinated…
Exploits Network Vulnerabilities2 Min Read October 3, 2025 DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely A critical vulnerability has been discovered in DrayTek’s DrayOS routers, which could allow unauthenticated remote attackers to execute…
DevOps Enterprise Security5 Min Read October 3, 2025 Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing…
DDoS Exploits Phishing Vulnerabilities2 Min Read October 3, 2025 Critical Splunk Vulnerabilities Expose Platforms to Remote JavaScript Injection and More Splunk has disclosed six critical security vulnerabilities impacting multiple versions of both Splunk Enterprise and Splunk Cloud Platform.…
Google Security2 Min Read October 3, 2025 Gmail business users can now send encrypted emails to anyone Google says that Gmail enterprise users can now send end-to-end encrypted emails to people who use any email service or platform. To send an…
Cloud Security Data Breach Ransomware Vulnerabilities2 Min Read October 3, 2025 Hackers Target Unpatched Flaws in Oracle E-Business Suite Oracle has advised customers that hackers may be exploiting vulnerabilities in unpatched instances of its E-Business Suite (EBS). This follows…