Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read February 4, 2026 Orchid Security Introduces Continuous Identity Observability for Enterprise Applications An innovative approach to discovering, analyzing, and governing identity… Identity Security Security Operations
2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw… Open Source Vulnerability
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
MCP Server Vulnerability2 Min Read September 29, 2025 First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted…
Exploits Vulnerabilities3 Min Read September 29, 2025 Formbricks Signature Verification Vulnerability Let Attackers Reset User Passwords Without Authorization A critical security flaw discovered in Formbricks, an open-source experience management platform, demonstrates how missing JWT signature…
Malware Phishing Ransomware Vulnerabilities3 Min Read September 29, 2025 Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code A newly discovered DLL hijacking vulnerability in Notepad++, the popular source code editor, could allow attackers to execute arbitrary code…
Windows1 Min Read September 29, 2025 Microsoft May Finally Let Windows Search Results Open in Your Default Browser At present, in Windows 11, online search results from the search panel are forcibly opened in Microsoft Edge, regardless of whether users have…
Data Breach DDoS Phishing Vulnerabilities2 Min Read September 29, 2025 SUSE Rancher Security Team Patches Three Vulnerabilities in Rancher Manager The SUSE Rancher Team has issued fixes for three affecting Rancher Manager, with severities ranging from Medium to High. These could lead to…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 TamperedChef Malware Rises: Deceptive Apps Use Signed Binaries and SEO Poisoning to Hijack Browsers Field Effect’s Threat Intelligence team has uncovered a new wave of the TamperedChef malware campaign, leveraging digitally signed…
Linux Ransomware Vulnerabilities Windows2 Min Read September 29, 2025 Akira Ransomware Exploits SonicWall VPN Accounts With Lightning-Fast Intrusions Akira ransomware Leaksite Arctic Wolf has observed a major uptick in Akira ransomware activity since late July 2025, with attackers…
Malware Ransomware Vulnerabilities Windows3 Min Read September 29, 2025 RedNovember: Chinese APT Expands Global Espionage to U.S. Defense, Aerospace, and Tech Firms A new report from Recorded Future’s Insikt Group reveals that the Chinese state-sponsored threat group RedNovember has significantly…
DDoS Malware Ransomware Vulnerabilities2 Min Read September 29, 2025 Morte Botnet Unveiled: A Rapidly Growing Loader-as-a-Service Campaign Exploiting Routers and Enterprise Apps Researchers at CloudSEK Threat Intelligence (TRIAD) have exposed a sophisticated botnet operation that systematically compromises SOHO…
Exploits Malware Vulnerabilities Windows2 Min Read September 29, 2025 DLL Hijacking Flaw (CVE-2025-56383) Found in Notepad++, Allowing Arbitrary Code Execution, PoC Available A newly disclosed in Notepad++ v8.8.3 has been assigned CVE-2025-56383. The , rated CVSS 6.5, allows attackers to hijack Notepad++’s DLL…
Security3 Min Read September 28, 2025 Akira ransomware breaching MFA-protected SonicWall VPN accounts Ongoing Akira ransomware attacks targeting SonicWall SSL VPN devices continue to evolve, with the threat actors found to be successfully…
Data Breach Malware Vulnerabilities Windows8 Min Read September 28, 2025 Prompt Injection and Model Poisoning: The New Plagues of AI Security You wake up. Your AI wakes up. Somewhere, a stranger types a sentence, and your AI listens. This is not science fiction. This is the…
Legal Software2 Min Read September 28, 2025 EU probes SAP over anti-competitive ERP support practices The European Comission is investigating potential anti-competitive practices in aftermarket services SAP provides for its on-premise ERP…
Data Breach Phishing Ransomware Vulnerabilities12 Min Read September 28, 2025 Cybersecurity Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More This week in cybersecurity was marked by a relentless pace of critical disclosures and unprecedented attack volumes, underscoring the…
Malware Phishing Ransomware3 Min Read September 28, 2025 AsyncRAT Malware Campaign Found Targeting South American Hotels A new AsyncRAT malware campaign from threat actor TA558 is targeting the South American hospitality industry, demanding the attention of…
Malware Phishing Vulnerabilities Windows5 Min Read September 28, 2025 Week in review: Cisco ASA zero-day vulnerabilities exploited, Fortra GoAnywhere instances at risk Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How Juventus protects fans,…
Security2 Min Read September 27, 2025 Fake Microsoft Teams installers push Oyster malware via malvertising Hackers have been spotted using SEO poisoning and search engine advertisements to promote fake Microsoft Teams installers that infect…
Ransomware Zero Trust6 Min Read September 27, 2025 The Looming Authorization Crisis: Why Traditional IAM Fails Agentic AI In today’s enterprise world, AI no longer just answers questions or writes emails, but it takes action. From copilots booking travel to…
Security2 Min Read September 27, 2025 Dutch teens arrested for trying to spy on Europol for Russia Two Dutch teenage boys aged 17, reportedly used hacking devices to spy for Russia, have been arrested by the Politie on Monday.…
Ransomware3 Min Read September 27, 2025 Embracing the AI Revolution: How to Incorporate Generative AI into Your SOC 2 Compliance Plan Generative AI (Gen AI) has emerged as a transformative force. From streamlining operations to enhancing customer experiences, AI-powered…
Malware Network Security3 Min Read September 27, 2025 China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Telecommunications and manufacturing sectors in Central and South Asian countries have emerged as the target of an ongoing campaign…
Malware Ransomware Vulnerabilities Windows5 Min Read September 27, 2025 Hunt for RedNovember: Beijing hacked critical orgs in year-long snooping campaign RedNovember, a Chinese state-sponsored cyberspy group, targeted government and critical private-sector networks around the globe between June…
Vulnerabilities2 Min Read September 27, 2025 Apache Airflow Vulnerability Exposes Sensitive Details to Read-Only Users A critical security flaw has emerged in Apache Airflow 3.0.3, exposing sensitive connection information to users with only read permissions.…
DDoS Linux Malware Vulnerabilities2 Min Read September 27, 2025 New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads A sophisticated botnet operation has emerged, employing a Loader-as-a-Service model to systematically weaponize internet-connected devices…
Exploits Vulnerabilities Windows2 Min Read September 27, 2025 CVE-2025-59934: Critical Flaw in Formbricks Allows Unauthorized Password Resets via Forged JWT Tokens The Formbricks project, an open-source platform for building in-app and website surveys, has released an urgent patch addressing a critical…
Cloud Security Ransomware Vulnerabilities Windows2 Min Read September 27, 2025 Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins A new wave of cyberattacks targeting organizations using SonicWall firewalls has been actively deploying Akira ransomware since late July…
Malware Vulnerabilities Windows2 Min Read September 27, 2025 ChatGPT Pulse Arrives: The Proactive AI Assistant That Reshapes Your Morning Routine OpenAI has introduced a new feature within ChatGPT called “ChatGPT Pulse”, a service designed to deliver personalized daily…
Artificial Intelligence Microsoft2 Min Read September 26, 2025 Microsoft’s new AI feature will organize your photos automatically Microsoft has begun testing a new AI-powered feature in Microsoft Photos, designed to categorize photos automatically on Windows 11 systems.…
Government Legal2 Min Read September 26, 2025 US investors to take over TikTok operations in the country U.S. President Donald Trump has signed an executive order approving a plan to restructure TikTok operations in the country to address national…
Microsoft Software2 Min Read September 26, 2025 Microsoft shares temp fix for Outlook encrypted email errors Microsoft is investigating a known issue that triggers Outlook errors when opening encrypted emails sent from other organizations. According…
Cryptocurrency Malware2 Min Read September 26, 2025 Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then used to…
Facebook Fraud Google Malware Scam Security TradingView2 Min Read September 26, 2025 Google Ads Used to Spread Trojan Disguised as TradingView Premium A malicious advertising campaign that has been tricking content creators and unsuspecting users into downloading harmful software by offering…
Microsoft Security2 Min Read September 26, 2025 Microsoft Edge to block malicious sideloaded extensions Microsoft is planning to introduce a new Edge security feature that will protect users against malicious extensions sideloaded into the web…
Ransomware4 Min Read September 26, 2025 From Defense to Offense: Why Ambitious CISOs Are Becoming Founders Once seen primarily as a technical gatekeeper, today’s chief information security officer (CISO) is a strategic leader responsible for…
Malware Vulnerabilities2 Min Read September 26, 2025 Attackers exploited critical Fortra GoAnywhere flaw in zero-day attacks (CVE-2025-10035) CVE-2025-10035, a perfect CVSS 10.0 vulnerability in the Fortra GoAnywhere managed file transfer solution, has apparently been exploited in…
Apple Malware Ransomware Vulnerabilities3 Min Read September 26, 2025 ‘An attacker's playground:’ Crims exploit GoAnywhere perfect-10 bug Security researchers have confirmed that threat actors have exploited the maximum-severity vulnerability affecting Fortra's GoAnywhere managed…
Amatera Stealer Crypto Cryptojacking Cybersecurity Malware Phishing Phishing Scam Police PureMiner Security SVG Ukraine2 Min Read September 26, 2025 Fake Ukraine Police Notices Spread New Amatera Stealer and PureMiner Hackers are distributing malicious emails that imitate official notices from the National Police of Ukraine. This phishing campaign,…
Apple Malware Network Vulnerabilities2 Min Read September 26, 2025 Critical Cisco SSL VPN Vulnerabilities The cybersecurity world is on alert after multiple critical vulnerabilities were discovered in Cisco SSL VPN solutions, specifically affecting…
Security2 Min Read September 26, 2025 Maximum severity GoAnywhere MFT flaw exploited as zero day Hackers are actively exploiting a maximum severity vulnerability (CVE-2025-10035) in Fortra's GoAnywhere MFT that allows injecting commands…
Microsoft3 Min Read September 26, 2025 Microsoft releases the final Windows 10 22H2 preview update Microsoft has released the final non-security preview update for Windows 10, version 22H2, which includes fixes for the out-of-box experience…
DDoS Exploits Vulnerabilities2 Min Read September 26, 2025 GitLab High-Severity Vulnerabilities Let Attackers Crash Instances GitLab has disclosed multiple high-severity Denial-of-Service (DoS) vulnerabilities that could allow unauthenticated attackers to crash…
Data Breach3 Min Read September 26, 2025 Critical Salesforce Vulnerability ‘ForcedLeak’ Exposes AI Agent Risks in AgentForce A recently disclosed security research report has revealed a severe vulnerability chain in Salesforce AgentForce, dubbed ForcedLeak, which…