Android Data Security3 Min Read May 6, 2026 Google's Android Apps Get Public Verification to Stop Supply Chain Attacks Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensur…
3 Min Read May 6, 2026 Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs Cybersecurity researchers have disclosed details of an intrusion that… Endpoint Security Threat Intelligence
2 Min Read May 6, 2026 Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution Palo Alto Networks has released an advisory warning that a critical… Network Security Vulnerability
2 Min Read May 5, 2026 Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE The Apache Software Foundation (ASF) has released security updates to… Server Security Vulnerability
Malware Nation-state Network Vulnerabilities2 Min Read April 25, 2026 Hackers Exploiting Cisco Firepower Devices’ Using n-day Vulnerabilities to Gain Unauthorized Access State-sponsored threat actors are actively targeting Cisco Firepower devices by chaining known vulnerabilities to deploy a highly customized…
Security2 Min Read April 24, 2026 ADT confirms data breach after ShinyHunters leak threat Home security giant ADT has confirmed a data breach after the ShinyHunters extortion group threatened to leak stolen data unless a ransom is…
Security3 Min Read April 24, 2026 Firestarter malware survives Cisco firewall updates, security patches Cybersecurity agencies in the U.S. and U.K. are warning about a custom malware called Firestarter persisting on Cisco Firepower and Secure…
Microsoft3 Min Read April 24, 2026 Windows Update gets new controls to reduce forced restarts Microsoft is rolling out Windows Update improvements that give users more control over how updates are installed while reducing…
Captcha ClickFix Cyber Attack Cybersecurity Fraud Malware Scam Scams and Fraud Security Windows3 Min Read April 24, 2026 New ClickFix attack Hides in Native Windows Tools to Reduce Detection Risk A new ClickFix attack campaign uses fake CAPTCHA pages to trick users into running malicious commands. Learn how hackers use cmdkey and…
Security2 Min Read April 24, 2026 New BlackFile extortion group linked to surge of vishing attacks A new financially motivated hacking group tracked as BlackFile has been linked to a wave of data theft and extortion attacks against retail…
Microsoft Security3 Min Read April 24, 2026 Microsoft to roll out Entra passkeys on Windows in late April Microsoft will roll out passkey support for phishing-resistant passwordless authentication to Microsoft Entra‑protected resources from…
Network Security Vulnerability5 Min Read April 24, 2026 FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency's Cisco Firepower device…
Malware Network Ransomware Vulnerabilities2 Min Read April 24, 2026 Governments on high alert after CISA snuffs out Firestarter backdoor on fed network A US federal agency was successfully targeted by a previously unknown backdoor malware called Firestarter, according to CISA cybersnoops and…
Espionage National Security,2 Min Read April 24, 2026 NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national…
Bitwarden Cyber Attack Cyber Attacks Cyber Crime Cybersecurity Developer Malware NPM Password manager Security TeamPCP3 Min Read April 24, 2026 TeamPCP Hijacks Bitwarden CLI, Uses Dependabot to Deploy Shai-Hulud Malware On April 20, 2026, at around 5:00 pm CET, the coding world was alerted after a widely used tool called @bitwarden/cli was found to be…
Network Vulnerabilities2 Min Read April 24, 2026 Academic Exposure: The Unpatched Flaw Siphoning Student Data from DRC INSIGHT A security has been unearthed in the DRC INSIGHT software—a platform widely used for proctoring academic exams. The flaw, tracked as…
Data Breach2 Min Read April 24, 2026 UK Biobank Data Breach: Health Data of 500,000 Listed for Sale in China The personal health data of over half a million UK Biobank volunteers has been put up for on e-commerce platforms and online marketplaces in…
Vulnerabilities Web Security2 Min Read April 24, 2026 The 9.1 CVSS Flaw: Why Millions of Spring Boot Apps May Be Exposed In a major update for the Java ecosystem, several critical have been disclosed in Spring Boot, the framework that powers millions of modern…
Vulnerabilities Web Security2 Min Read April 24, 2026 Triple Threat: Apache ActiveMQ Vulnerabilities Expose Enterprises to RCE and XSS Apache ActiveMQ, the world’s most popular open-source message broker, is currently facing a series of “Important” security…
Cloud Security2 Min Read April 24, 2026 AI Rush is Reviving Old Cybersecurity Mistakes, Mandiant VP Warns The rush to adopt AI in enterprise environments is not only creating new security vulnerabilities, but is also reviving old security failures,…
Artificial Intelligence Enterprise Security4 Min Read April 24, 2026 Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine The AI Agent Authority Gap - From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in…
Cryptocurrency Malware3 Min Read April 24, 2026 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an…
Phishing Ransomware Vulnerabilities Windows2 Min Read April 24, 2026 Microsoft beefs up Remote Desktop security with … hard-to-read messages Microsoft's update to harden Remote Desktop against phishing attacks has arrived. When users open a Remote Desktop (.rdp) file, they should…
Exploits IoT Security Network Vulnerabilities2 Min Read April 24, 2026 Xiongmai IP Camera Vulnerability Let Attackers Bypass Authentication and have Remote Access Security cameras are designed to keep commercial facilities safe. However, a newly disclosed critical vulnerability in Hangzhou Xiongmai…
Apple Linux Vulnerabilities Windows2 Min Read April 24, 2026 Python Vulnerability Allows Out-of-Bounds Write on Windows Systems A security vulnerability has been discovered in Python’s Windows asyncio implementation, allowing attackers to trigger out-of-bounds…
Data Breach Linux Vulnerabilities Windows2 Min Read April 24, 2026 Hackers Can Exploit Ollama Model Uploads to Leak Sensitive Server Data A critical, unpatched vulnerability has been discovered in Ollama, a widely used open-source platform for running Large Language Models…
Vulnerabilities Web Security1 Min Read April 24, 2026 Vulnerability in AdaptiveGRC software CVE ID CVE-2026-4313 Publication date 24 April 2026 Vendor C&F Product AdaptiveGRC Vulnerable versions released before December 2025.…
BreachForums Cyber Crime Cybersecurity DarkForums Data Breaches Data leak France HexDex Security2 Min Read April 24, 2026 French Police Arrest HexDex Hacker Over Mass Data Theft and Leaks French police have arrested a 20-year-old male suspected of alleged data exfiltration from dozens of websites and stealing private…
Malware Threat Intelligence2 Min Read April 24, 2026 Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2 Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2…
Botnets Malware Ransomware Supply Chain2 Min Read April 24, 2026 Npm Supply Chain Malware Attack Targets Developers With Worm-Like Propagation Malicious npm packages have been identified distributing malware that steals credentials and attempts to spread across developer ecosystems.…
Network Security Vulnerability3 Min Read April 24, 2026 LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving LLMs, has come under active…
Cloud Security Malware4 Min Read April 23, 2026 UNC6692 Impersonates IT Helpdesk via Microsoft Teams to Deploy SNOW Malware A previously undocumented threat activity cluster known as UNC6692 has been observed leveraging social engineering tactics via Microsoft Teams…
Afghanistan Carbon Black Cyber Attack Cyber Attacks Cybersecurity GoGra Harvester APT India Linux Malware Security Symantec3 Min Read April 23, 2026 Harvester APT Expands Spying Operations with New GoGra Linux Malware A nation-state-backed Advanced Persistent Threat (APT) group identified as Harvester has, reportedly, developed a new, malicious backdoor…
Cloud Security2 Min Read April 23, 2026 Google Favors General-Purpose Gemini Models Over Cybersecurity‑Specific AI Google Cloud’s operations chief said the tech giant does not plan to release a separate, cyber‑focused frontier model like…
Open Source Supply Chain Attack4 Min Read April 23, 2026 Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from…
Cybersecurity News Hacking News15 Min Read April 23, 2026 ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories You scroll past one incident and see another that feels familiar, like it should have been fixed years ago, but it still works with small…
Apple Data Breach Vulnerabilities2 Min Read April 23, 2026 Apple Fixes iOS Notification Bug Exposing Deleted Messages Apple has issued an emergency update to fix a Notification Services flaw that caused deleted alerts to remain stored on devices,…
Artificial Intelligence Enterprise Security2 Min Read April 23, 2026 [Webinar] Mythos Reality Check: Beating Automated Exploitation at AI Speed Imagine a world where hackers don't sleep, don't take breaks, and find weak spots in your systems instantly. Well, that world is already here.…
Cloud Security Zero Trust4 Min Read April 23, 2026 Google Introduces Unique AI Agent Identities in New Gemini Enterprise Platform Google is betting big on agentic AI and wants professionals to track their AI agents on its new hub Gemini Enterprise Agent Platform.…
Artificial Intelligence Exposure Management6 Min Read April 23, 2026 Project Glasswing Proved AI Can Find the Bugs. Who's Going to Fix Them? Last week, Anthropic announced Project Glasswing, an AI model so effective at discovering software vulnerabilities that they took the…
Data Breach Malware Phishing Ransomware2 Min Read April 23, 2026 Cyber-Attacks Surge 63% Annually in Education Sector Schools and universities across the globe experienced a sharp increase in attacks last year thanks to the combined threat from…
Artificial Intelligence Claude Code Copilot Cyber Attack Cybersecurity GitHub GitHub Copilot Indirect Prompt Injection IPI Security Vulnerability3 Min Read April 23, 2026 Hackers Use Hidden Website Instructions in New Attacks on AI Assistants Threat actors are now using a method called Indirect Prompt Injection (IPI) to trick Large Language Models (LLMs) by hiding secret commands on…
DDoS Ransomware3 Min Read April 23, 2026 Researchers Uncover 10 In-the-Wild Prompt Injection Payloads Targeting AI Agents Security researchers have discovered 10 new indirect prompt injection (IPI) payloads targeting AI agents with malicious instructions designed…
Malware Threat Intelligence2 Min Read April 23, 2026 China-Linked GopherWhisper Infects 12 Mongolian Government Systems with Go Backdoors Mongolian governmental institutions have emerged as the target of a previously undocumented China-aligned advanced persistent threat (APT)…
Apple Windows2 Min Read April 23, 2026 NCSC Backs Passkeys, Hailing a New Era of Sign-in The UK’s National Cyber Security Centre (NSCS) has fully backed passkeys, stating that it should be “should now be…
Artificial Intelligence SaaS Security2 Min Read April 23, 2026 Vercel Finds More Compromised Accounts in Context.ai-Linked Breach Vercel on Wednesday revealed that it has identified an additional set of customer accounts that were compromised as part of a security…