Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read February 4, 2026 Orchid Security Introduces Continuous Identity Observability for Enterprise Applications An innovative approach to discovering, analyzing, and governing identity… Identity Security Security Operations
2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw… Open Source Vulnerability
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
Microsoft3 Min Read September 30, 2025 Windows 11 KB5065789 update released with 41 changes and fixes Microsoft has released the KB5065789 preview cumulative update for Windows 11 24H2, which includes 41 improvements, including…
Security2 Min Read September 30, 2025 Broadcom fixes high-severity VMware NSX bugs reported by NSA Broadcom has released security updates to patch two high-severity VMware NSX vulnerabilities reported by the U.S. National Security Agency…
Artificial Intelligence Threat Detection3 Min Read September 30, 2025 Stop Alert Chaos: Context Is the Key to Effective Incident Response The Problem: Legacy SOCs and Endless Alert Noise Every SOC leader knows the feeling: hundreds of alerts pouring in, dashboards lighting up…
Vulnerability Zero-Day1 Min Read September 30, 2025 Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since…
Supply Chain2 Min Read September 30, 2025 Asahi Suspends Operations in Japan After Cyber-Attack Brewing giant Asahi has suspended operations in Japan following a “system failure” caused by a cyber-attack. The firm, which is headquartered…
AI Artificial Intelligence Fraud LLM Microsoft Phishing Phishing Scam Scam Security SVG3 Min Read September 30, 2025 Microsoft Flags AI Phishing Attack Hiding in SVG Files Forget the old, error-filled emails you could spot easily. Cybercriminals have completely upgraded their methods, using AI (Artificial…
Cybercrime Mobile Security4 Min Read September 30, 2025 New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO)…
Documents PDF Technology3 Min Read September 30, 2025 Tips for Merging Large PDF Files Online As more businesses rely on digital documents today, effective large file management has also become necessary. PDFs are a ubiquitous file…
Artificial Intelligence Data Protection3 Min Read September 30, 2025 Evolving Enterprise Defense to Secure the Modern AI Supply Chain The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors…
Ransomware2 Min Read September 30, 2025 CIISec Members Say Budgets Are Falling Behind Threats Cybersecurity budgets in the UK are stagnating, even as job prospects and industry growth improves, a new poll of industry professionals has…
Cryptocurrency Digital Crime3 Min Read September 30, 2025 U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust A Chinese national has been convicted for her role in a fraudulent cryptocurrency scheme after law enforcement authorities in the U.K.…
Linux Vulnerability2 Min Read September 30, 2025 CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line…
Security2 Min Read September 29, 2025 UK convicts "Bitcoin Queen" in world’s largest cryptocurrency seizure The Metropolitan Police has secured a conviction in what is believed to be the world's largest cryptocurrency seizure, valued at more than…
Security2 Min Read September 29, 2025 Japan's largest brewer suspends operations due to cyberattack Asahi Group Holdings, Ltd (Asahi), the brewer of Japan’s top-selling beer, has disclosed a cyberattack that disrupted several of its…
Malware Phishing Vulnerabilities Windows3 Min Read September 29, 2025 China-linked RedNovember Campaign Shows Importance of Patching Edge Devices A long-running threat campaign linked to a Chinese state-sponsored cyber-espionage group highlights the importance of patching and protecting…
Cyber Crime Cybersecurity Europol Netherlands Russia2 Min Read September 29, 2025 Dutch Teens Arrested Over Alleged Spying for Pro-Russian Hackers Two 17-year-old boys from the Netherlands have been arrested on suspicion of spying for pro-Russian hackers, Dutch authorities recently…
Security3 Min Read September 29, 2025 Ransomware gang sought BBC reporter’s help in hacking media giant Threat actors claiming to represent the Medusa ransomware gang tempted a BBC correspondent to become an insider threat by offering a…
Exploits Linux Malware Vulnerabilities7 Min Read September 29, 2025 You name it, VMware elevates it (CVE-2025-41244) On September 29th, 2025, Broadcom disclosed a local privilege escalation vulnerability, CVE-2025-41244, impacting VMware’s guest service…
Artificial Intelligence Malware4 Min Read September 29, 2025 EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations Threat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software to sneakily slip malware for…
Security3 Min Read September 29, 2025 UK govt backs JLR with £1.5 billion loan guarantee after cyberattack The UK Government is providing Jaguar Land Rover (JLR) with a £1.5 billion loan guarantee to restore its supply chain after a…
Artificial Intelligence2 Min Read September 29, 2025 Brave launches 'Ask Brave' feature to fuse AI with traditional search Brave Software, the creator of the privacy-focused web browser and search engine, has introduced a new subsystem called Ask Brave that unifies…
Vulnerabilities2 Min Read September 29, 2025 Dutch Authorities Arrest Teens in Foreign Interference Case Two 17-year-old boys have been arrested in the Netherlands on suspicion of involvement in espionage activities. Dutch media reported…
Exploits Phishing Windows2 Min Read September 29, 2025 AI-Generated Code Used in Phishing Campaign Blocked by Microsoft A credential phishing campaign that likely relied on AI-generated code to evade detection has been stopped by Microsoft Threat Intelligence.…
Botnets Network Ransomware Vulnerabilities3 Min Read September 29, 2025 Akira ransomware: From SonicWall VPN login to encryption in under four hours Four hours or less: that’s how long it takes for Akira affiliates to break into organizations and deploy the ransomware on their…
Malware Phishing Ransomware Windows2 Min Read September 29, 2025 Inside the Mind of a Threat Actor: What CISOs Must Learn Before the Next Breach Cybersecurity isn’t a game of defense—it’s a game of anticipation. Yet too many CISOs and security leaders still think in…
Security2 Min Read September 29, 2025 Harrods suffers new data breach exposing 430,000 customer records UK retail giant Harrods has disclosed a new cybersecurity incident after hackers compromised a third-party supplier and stole 430,000 records…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 New TamperedChef Malware Leverages Productivity Tools to Gain Access and Exfiltrate Sensitive Data A sophisticated malware campaign has emerged that weaponizes seemingly legitimate productivity tools to infiltrate systems and steal sensitive…
ICS/OT Supply Chain2 Min Read September 29, 2025 National Cyber Authorities Launch OT Security Guidance National cybersecurity agencies from seven countries, including the Five Eyes nations, have released new operational technology (OT) security…
Exploits Phishing Ransomware Vulnerabilities4 Min Read September 29, 2025 Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment.…
Artificial Intelligence Technology2 Min Read September 29, 2025 ChatGPT tests free trial for paid plans, rolls out cheaper Go in more regions OpenAI is offering some users a free trial for ChatGPT Plus, which costs $20. In addition, $4 GPT Go is now available in Indonesia. As spotted…
Cybersecurity Hacking News15 Min Read September 29, 2025 Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden…
Artificial Intelligence Technology1 Min Read September 29, 2025 OpenAI is routing GPT-4o to safety models when it detects harmful activities Over the weekend, some people noticed that GPT-4o is routing requests to an unknown model out of nowhere. Turns out it's a "safety" feature.…
Artificial Intelligence Enterprise Security5 Min Read September 29, 2025 The State of AI in the SOC 2025 – Insights from Recent Study Security leaders are embracing AI for triage, detection engineering, and threat hunting as alert volumes and burnout hit breaking points. A…
Apple Exploits Malware Vulnerabilities2 Min Read September 29, 2025 WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File WhatsApp 0-click remote code execution (RCE) vulnerability affecting Apple’s iOS, macOS, and iPadOS platforms, detailed with a proof of…
DDoS Vulnerabilities1 Min Read September 29, 2025 Vulnerability in CivetWeb software CVE ID CVE-2025-9648 Publication date 29 September 2025 Vendor CivetWeb Product CivetWeb Vulnerable versions All before 1.08 Vulnerability…
DDoS Exploits Ransomware Vulnerabilities2 Min Read September 29, 2025 SUSE Rancher Vulnerabilities Let Attackers Lockout the Administrators Account A critical flaw in SUSE Rancher’s user management module allows privileged users to disrupt administrative access by modifying usernames…
Malware Ransomware Social Engineering2 Min Read September 29, 2025 Two-Thirds of Organizations Have Unfilled Cybersecurity Positions Organizations continue to experience significant cybersecurity skills shortages, with 65% of firms reporting unfilled cyber positions, a new…
Apple DDoS Exploits3 Min Read September 29, 2025 Google Project Zero Exposes ASLR Bypass Vulnerability in Apple’s Serialization Framework Google Project Zero has revealed a new technique capable of bypassing Address Space Layout Randomization (ASLR) protections on Apple devices.…
Network Ransomware Vulnerabilities2 Min Read September 29, 2025 SonicWall SSL VPN Attacks Escalate, Bypassing MFA Security experts have warned of a surge in malicious activity from Akira ransomware actors targeted at victims running SonicWall SSL VPN…
Malware Network Ransomware Vulnerabilities10 Min Read September 29, 2025 Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In The Wild The cybersecurity landscape experienced a significant escalation in September 2025, when Cisco disclosed multiple critical zero-day…
Artificial Intelligence Email Security4 Min Read September 29, 2025 Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated…
Data Breach Ransomware Supply Chain2 Min Read September 29, 2025 Harrods Reveals Supply Chain Breach Impacting Online Customers Luxury London department store Harrods has revealed that some of its e-commerce customers have had their personal information stolen via a…