Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read February 4, 2026 Orchid Security Introduces Continuous Identity Observability for Enterprise Applications An innovative approach to discovering, analyzing, and governing identity… Identity Security Security Operations
2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw… Open Source Vulnerability
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
Anti-Malware Research6 Min Read September 25, 2025 The Scam That Won’t Quit: Malicious “TradingView Premium” Ads Jump from Meta to Google and YouTube Over the past year, Bitdefender researchers have been monitoring a persistent malicious campaign that initially spread via Facebook Ads,…
Legal Security2 Min Read September 25, 2025 Teen suspected of Vegas casino cyberattacks released to parents A 17-year-old hacker who surrendered to face charges over cyberattacks targeting Vegas casinos in 2023 has been released into the custody of…
Microsoft2 Min Read September 25, 2025 Microsoft will offer free Windows 10 security updates in Europe Microsoft will offer free extended security updates for Windows 10 users in the European Economic Area (EEA), which includes Iceland,…
Penetration Testing Vulnerability Management5 Min Read September 25, 2025 CTEM's Core: Prioritization and Validation Despite a coordinated investment of time, effort, planning, and resources, even the most up-to-date cybersecurity systems continue to fail.…
Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
Malware Ransomware Vulnerabilities Windows3 Min Read September 25, 2025 Chinese Hackers Use 'BRICKSTORM' Backdoor to Breach US Firms Chinese cyber threat actors are suspected of deploying a recently identified backdoor to get a foothold into the systems of US organizations…
Ransomware2 Min Read September 25, 2025 Co-op Records £206m Revenue Loss Following Cyber-Attack The Co-op has revealed that it has lost approximately £206m ($277m) in revenue as a direct result of the “malicious” cyber-attack it…
Cl0p Cybersecurity File Transfer Fortra GoAnywhere Ransomware Security Vulnerability3 Min Read September 25, 2025 Critical CVSS 10 Flaw in GoAnywhere File Transfer Threatens 20,000 Systems Thousands of companies using Fortra’s GoAnywhere Managed File Transfer (MFT) solution are facing an immediate threat of full system…
DDoS Exploits IoT Security Ransomware3 Min Read September 25, 2025 Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds The latest Gcore Radar report analyzing attack data from Q1–Q2 2025, reveals a 41% year-on-year increase in total attack volume. The…
Mobile Security Ransomware Supply Chain2 Min Read September 25, 2025 Experts Warn of Global Breach Risk from Indian Suppliers Global supply chains could be at risk after a new report revealed a surprisingly high share of Indian vendors have suffered a third-party…
BRICKSTORM China Cyber Attack Cybersecurity Google Linux Malware Mandiant SaaS Security UNC5221 Vulnerability3 Min Read September 25, 2025 China-Linked Hackers Hit US Tech Firms with BRICKSTORM Malware A group of hackers with links to China has been caught running a long-term spying operation against US companies. Cybersecurity researchers at…
Ransomware Supply Chain2 Min Read September 25, 2025 NCA Arrest Man as HardBit Ransomware Blamed for Airport Outages British investigators have arrested a man in connection with a suspected ransomware attack which continues to cause flight delays across…
Malware Software Security2 Min Read September 25, 2025 Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed Cybersecurity researchers have discovered two malicious Rust crates impersonating a legitimate library called fast_log to steal Solana and…
Breach and Attack CISO Press Release Report Research4 Min Read September 25, 2025 Gcore Radar Report Reveals 41% Surge in DDoS Attack Volumes Luxembourg, Luxembourg, September 25th, 2025, CyberNewsWire Gcore, the global edge AI, cloud, network, and security solutions provider, today…
Network Security Vulnerability2 Min Read September 25, 2025 Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software Cisco has warned of a high-severity security flaw in IOS Software and IOS XE Software that could allow a remote attacker to execute arbitrary…
Ransomware Vulnerabilities Web Security2 Min Read September 25, 2025 Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts A critical stored cross-site scripting vulnerability has emerged in the popular DotNetNuke (DNN) Platform, threatening websites powered by…
Apple DDoS Malware Vulnerabilities2 Min Read September 25, 2025 Cisco SNMP Flaw (CVE-2025-20352) Actively Exploited: Patch Now to Stop Root Access! Cisco has issued a security advisory warning of a critical flaw in its IOS and IOS XE Software, tracked as CVE-2025-20352 with a CVSS score of…
Exploits Linux Vulnerabilities2 Min Read September 25, 2025 US Federal Agency Breached Via GeoServer Vulnerability IntroductionIn September 2025, CISA confirmed that a major breach had impacted a US federal agency through the exploitation of a critical…
Botnets Email Security Malware2 Min Read September 25, 2025 Hidden Backdoors in WordPress: How Attackers Use Fake Plugins and Core Files for Persistent Access Security researcher Puja Srivastava from Sucuri uncovered two malicious files designed to guarantee persistent attacker access by manipulating…
Linux Phishing Ransomware Vulnerabilities2 Min Read September 25, 2025 New Phishing Campaign Targets PyPI Maintainers with Fake Domain The Python Package Index (PyPI) is once again the target of a phishing campaign aimed at maintainers, with attackers using domain confusion…
Linux Social Engineering Vulnerabilities Windows2 Min Read September 25, 2025 CVE-2025-41715 (CVSS 9.8): Unauthenticated Flaw Exposes WAGO Industrial Databases VDE CERT has issued a security advisory disclosing two vulnerabilities in WAGO Device Sphere and WAGO Solution Builder, software widely used…
DDoS Malware Ransomware Vulnerabilities3 Min Read September 25, 2025 ShadowV2: How a New DDoS Botnet Mimics Cloud-Native Apps The login UI | Image: Darktrace Researchers at Darktrace have identified a sophisticated new campaign that merges traditional malware…
Security2 Min Read September 24, 2025 New Supermicro BMC flaws can create persistent backdoors Two vulnerabilities affecting the firmware of Supermicro hardware, including Baseboard Management Controller (BMC) allow attackers to…
Artificial Intelligence Technology1 Min Read September 24, 2025 OpenAI is testing a new GPT-5-based AI agent "GPT-Alpha" OpenAI is internally testing a new version of its AI agent, which uses a special version of GPT-5 dubbed "GPT-Alpha." Earlier today, OpenAI…
Linux Security3 Min Read September 24, 2025 Kali Linux 2025.3 released with 10 new tools, wifi enhancements Kali Linux has released version 2025.3, the third version of 2025, featuring ten new tools, Nexmon support, and NetHunter improvements. Kali…
Apple DDoS Network Vulnerabilities3 Min Read September 24, 2025 Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild Cisco has disclosed a zero-day vulnerability, CVE-2025-20352, in its widely used IOS and IOS XE software, confirming it is being actively…
Cyber Attack Cybersecurity Developers Phishing Scam Privacy PSF PyPI Scam Security Software2 Min Read September 24, 2025 PSF Warns of Fake PyPI Login Site Stealing User Credentials The Python Software Foundation (PSF) is warning developers about a fresh phishing campaign that targets users of the Python Package Index…
Security2 Min Read September 24, 2025 Cisco warns of IOS zero-day vulnerability exploited in attacks Cisco has released security updates to address a high-severity zero-day vulnerability in Cisco IOS and IOS XE Software that is currently being…
Exploits Ransomware Supply Chain Vulnerabilities5 Min Read September 24, 2025 CVE-2025-23298: Getting Remote Code Execution in NVIDIA Merlin While investigating the security posture of various machine learning (ML) and artificial intelligence (AI) frameworks, the Trend Micro Zero…
Network Security Vulnerability3 Min Read September 24, 2025 Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike A suspected cyber espionage activity cluster that was previously found targeting global government and private sector organizations spanning…
Mobile Security3 Min Read September 24, 2025 Unpatched flaw in OnePlus phones lets rogue apps text messages A vulnerability in multiple versions of OxygenOS, the Android-based operating system from OnePlus, allows any installed app to access SMS data…
Malware Ransomware Supply Chain2 Min Read September 24, 2025 npm Package Uses QR Code Steganography to Steal Credentials A malicious npm package named Fezbox has been found using an unusual technique to conceal harmful code. The package employs a QR code as part…
Security2 Min Read September 24, 2025 Police seizes $439 million stolen by cybercrime rings worldwide In a five-month joint operation led by Interpol, law enforcement agencies have seized more than $439 million in cash and cryptocurrency linked…
IoT Security Zero Trust2 Min Read September 24, 2025 Artificial Intelligence – Supported Internet of Things Security Milica D. DjekicSeptember 24, 2025 Transforming digital technology landscape and encompassing global product and service marketplace are…
Cloud Security DDoS Malware Ransomware2 Min Read September 24, 2025 ShadowV2 Botnet Exposes Rise of DDoS-as-a-service Platforms A new campaign that combines traditional malware with modern DevOps tooling has been observed by cybersecurity analysts. The ShadowV2 DDoS…
Cyber Espionage Threat Intelligence4 Min Read September 24, 2025 UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the…
Linux Malware Vulnerabilities Windows5 Min Read September 24, 2025 Google warns China-linked spies lurking in 'numerous' enterprises since March Unknown intruders – likely China-linked spies – have broken into "numerous" enterprise networks since March and deployed…
Security2 Min Read September 24, 2025 Google: Brickstone malware used to steal U.S. orgs' data for over a year Suspected Chinese hackers have used the Brickstorm malware in long-term persistence espionage operations against U.S. organizations in the…
Security2 Min Read September 24, 2025 UK arrests suspect for RTX ransomware attack causing airport disruptions The UK's National Crime Agency has arrested a suspect linked to a ransomware attack that is causing widespread disruptions across European…
AI Security Vulnerability5 Min Read September 24, 2025 Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the…
Exploits Vulnerabilities1 Min Read September 24, 2025 SolarWinds fixes critical Web Help Desk RCE vulnerability (CVE-2025-26399) SolarWinds has fixed yet another unauthenticated remote code execution vulnerability (CVE-2025-26399) in Web Help Desk (WHD), its popular…
Security2 Min Read September 24, 2025 PyPI urges users to reset credentials after new phishing attacks The Python Software Foundation has warned victims of a new wave of phishing attacks using a fake Python Package Index (PyPI) website to reset…