Malware Threat Intelligence5 Min Read February 4, 2026 China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read February 4, 2026 Orchid Security Introduces Continuous Identity Observability for Enterprise Applications An innovative approach to discovering, analyzing, and governing identity… Identity Security Security Operations
2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw… Open Source Vulnerability
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
Cloud Security DevOps Security4 Min Read September 23, 2025 Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation Big companies are getting smaller, and their CEOs want everyone to know it. Wells Fargo has cut its workforce by 23% over five years, Bank of…
Botnet Cloud Security4 Min Read September 23, 2025 ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service Cybersecurity researchers have disclosed details of a new botnet that customers can rent access to conduct distributed denial-of-service…
Security3 Min Read September 23, 2025 NPM package caught using QR Code to fetch cookie-stealing malware Newly discovered npm package 'fezbox' employs QR codes to retrieve cookie-stealing malware from the threat actor's server. The…
Exploits Malware Phishing Ransomware2 Min Read September 23, 2025 Attacker Breakout Time Falls to 18 Minutes Threat actors are accelerating their attacks and adopting innovative new ways to circumvent endpoint detection mechanisms, according to a new…
Phishing2 Min Read September 23, 2025 Car Giant Stellantis Confims Third-Party Breach Stellantis, one of the world’s leading car manufacturers, has confirmed it was affected by a cyber incident targeting a third-party supplier.…
Malware Supply Chain Attack3 Min Read September 23, 2025 GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security GitHub on Monday announced that it will be changing its authentication and publishing options "in the near future" in response to a recent…
Phishing Ransomware Social Engineering Supply Chain2 Min Read September 23, 2025 Jaguar Land Rover Extends Production Pause Again The UK’s largest carmaker has announced a further delay to restarting production after suffering a major cyber-attack earlier this month.…
Linux Ransomware Vulnerabilities Windows2 Min Read September 23, 2025 CVE-2025-26399 (CVSS 9.8): SolarWinds Web Help Desk Hit by Critical RCE Vulnerability SolarWinds has released a hotfix for its Web Help Desk (WHD) software after the discovery of a critical remote code execution (RCE)…
Malware SEO Poisoning3 Min Read September 23, 2025 BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells Cybersecurity researchers are calling attention to a search engine optimization (SEO) poisoning campaign likely undertaken by a…
Email Security Nation-state Vulnerabilities2 Min Read September 23, 2025 Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands A critical security flaw in Libraesva ESG email security gateways has been identified and patched, allowing threat actors to execute arbitrary…
Exploits2 Min Read September 23, 2025 Review: Practical Purple Teaming Practical Purple Teaming is a guide to building stronger collaboration between offensive and defensive security teams. The book focuses on how…
Vulnerabilities Web Security Windows2 Min Read September 23, 2025 CVE-2025-9125: Cross-Site Scripting Flaw in Lectora Courses Puts E-Learning Platforms at Risk The CERT Coordination Center (CERT/CC) has issued a vulnerability note warning of a cross-site scripting (XSS) flaw affecting Lectora, a…
Email Security Exploits Network Vulnerabilities2 Min Read September 23, 2025 CVE-2025-59689: Libraesva ESG Command Injection Flaw Exploited in the Wild Libraesva has released an urgent security advisory addressing a command injection vulnerability (CVE-2025-59689) in its Email Security Gateway…
Botnets Malware Supply Chain Windows2 Min Read September 23, 2025 BlockBlasters: When a Steam Game Turns Into a Malware Delivery Vehicle What began as a promising indie platformer has turned into one of the most alarming cases of malware-laced games on Steam in 2025. According…
Data Breach Malware Ransomware Windows3 Min Read September 23, 2025 Kawa4096: A New Ransomware Group with Akira-Style Branding and Qilin-Like Notes In June 2025, a new ransomware group known as Kawa4096 surfaced, launching disruptive attacks against multinational organizations in finance,…
Malware Phishing Vulnerabilities Windows2 Min Read September 23, 2025 Beyond Trust: A New Campaign Is Using a Legitimate Tool to Deliver RATs A new report from Hunt Intelligence reveals how attackers are abusing ConnectWise ScreenConnect (formerly ConnectWise Control) to deliver…
Security2 Min Read September 22, 2025 Airport disruptions in Europe caused by a ransomware attack The disruptions over the weekend at several major European airports were caused by a ransomware attack targeting the check-in and boarding…
Security2 Min Read September 22, 2025 American Archive of Public Broadcasting fixes bug exposing restricted media A vulnerability in the American Archive of Public Broadcasting's website allowed downloading of protected and private media for…
AI security frontier Artificial Intelligence Black Hat 2025 CISO strategy OWASP Top 10 Spotlight1 Min Read September 22, 2025 Innovator Spotlight: Wallarm The Digital Fortress: How APIs Are Reshaping Cybersecurity in the Age of AI Cybersecurity isn’t just about protecting networks.…
Security2 Min Read September 22, 2025 Automaker giant Stellantis confirms data breach after Salesforce hack Automotive manufacturing giant Stellantis has confirmed that attackers stole some of its North American customers' data after gaining access…
Security2 Min Read September 22, 2025 New EDR-Freeze tool uses Windows WER to suspend security software A new method and proof-of-concept tool called EDR-Freeze demonstrates that evading security solutions is possible from user mode with…
Microsoft2 Min Read September 22, 2025 Microsoft lifts Windows 11 update block after face detection fix Microsoft has removed a compatibility hold that prevented devices with integrated cameras from installing Windows 11 24H2 due to a face…
Data Breach Malware Ransomware Vulnerabilities4 Min Read September 22, 2025 VMScape attack | Kaspersky official blog A team of researchers at the Swiss Federal Institute of Technology in Zurich (ETH Zurich) has published a research paper demonstrating how a…
Cloud Security Malware Phishing Ransomware4 Min Read September 22, 2025 Organizations Must Update Defenses to Scattered Spider Tactics, Experts Urge Organizations must urgently update their defenses to protect against tactics deployed by the Scattered Spider hacking collective this year,…
Security Software2 Min Read September 22, 2025 Mozilla now lets Firefox add-on devs roll back bad updates Mozilla has announced a new feature that enables Firefox extension developers to roll back to previously approved versions, allowing them to…
Data Theft Malware3 Min Read September 22, 2025 ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks Organizations in Belarus, Kazakhstan, and Russia have emerged as the target of a phishing campaign undertaken by a previously undocumented…
Security2 Min Read September 22, 2025 LastPass: Fake password managers infect Mac users with malware LastPass is warning users of a campaign that targets macOS users with malicious software impersonating popular products delivered through…
Network Ransomware4 Min Read September 22, 2025 Why VPNs Fail for Hybrid Workforces and The Importance of Privileged Access Management (PAM) To Protect Against Third-Party Risks Let’s start by being clear that what you need to do to support “hybrid work” versus a “hybrid workforce”…
Microsoft2 Min Read September 22, 2025 Microsoft says recent updates cause DRM video playback issues Microsoft has confirmed a known issue that prevents some apps from playing Digital Rights Management (DRM) protected video content or…
Data Breach Exploits IoT Security Ransomware7 Min Read September 22, 2025 Why the Cybersecurity Talent Shortage is a Global Threat In the era of digital transformation, where data flows across borders and devices, data security is paramount. Cyberattacks are no longer…
Malware Network Ransomware Windows6 Min Read September 22, 2025 Major Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test Three major providers of cybersecurity solutions have decided not to take part in the 2025 edition of MITRE’s annual endpoint detection and…
Data Breach Linux Web Security3 Min Read September 22, 2025 JWT Warfare: Obfuscation, Cracking, and Red Team Exploits | Cyber Codex What is JWT?JWT (JSON Web Token) is a compact, URL-safe method of representing claims between two parties. It is used mostly in stateless…
Linux Malware Vulnerabilities Windows3 Min Read September 22, 2025 Chrome Type Confusion 0-Day Vulnerability Code Analysis Released Google Chrome’s V8 JavaScript engine has been compromised by a critical type confusion zero-day vulnerability, designated…
Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
Network Ransomware Vulnerabilities2 Min Read September 22, 2025 Unpatched Fortra GoAnywhere instances at risk of full takeover (CVE-2025-10035) If you’re running Fortra’s GoAnywhere managed file transfer solution and you haven’t updated to the latest available version…
AI Security Cloud Security7 Min Read September 22, 2025 How to Gain Control of AI Agents and Non-Human Identities We hear this a lot: "We've got hundreds of service accounts and AI agents running in the background. We didn't create most of them. We don't…
Vulnerabilities1 Min Read September 22, 2025 Vulnerability in GALAYOU G2 software CVE ID CVE-2025-9983 Publication date 22 September 2025 Vendor GALAYOU Product G2 Vulnerable versions 11.100001.01.28 Vulnerability type (CWE)…
Cloud Security Exploits Vulnerabilities Windows3 Min Read September 22, 2025 Microsoft Entra ID Exposed: Actor Token Flaw Enables Stealthy Global Admin Takeove A newly disclosed vulnerability tracked as CVE-2025-55241 has been reported. The flaw, discovered by an independent researcher and disclosed…
Phishing2 Min Read September 22, 2025 FBI Says Threat Actors Are Spoofing its IC3 Site The FBI has urged cybercrime victims to exercise caution when visiting its Internet Crime Complaint Center (IC3) website, claiming that threat…
Cryptocurrency Gaming Security3 Min Read September 22, 2025 Verified Steam game steals streamer's cancer treatment donations A gamer seeking financial support for cancer treatment lost $32,000 after downloading from Steam a verified game named BlockBlasters that…
Ransomware Supply Chain2 Min Read September 22, 2025 Airport Chaos Enters Third Day After Supply Chain Attack A suspected cyber-attack targeting a third-party software supplier has caused major flight cancellations and delays at several European…
Apple Ransomware3 Min Read September 22, 2025 Apple’s In-House Chips Pave the Way for On-Device AI Revolution In recent years, Apple has vigorously advanced its strategy of self-developing chips, evolving from the A-series and M-series processors to…