Open Source Vulnerability2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "@react-native-community/cli" n…
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
3 Min Read February 3, 2026 APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks The Russia-linked state-sponsored threat actor known as APT28 (aka… Malware Vulnerability
2 Min Read February 3, 2026 Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox Mozilla on Monday announced a new controls section in its Firefox… Artificial Intelligence Privacy
Browser Security Cybercrime3 Min Read November 22, 2025 Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new…
Software Security Zero-Day2 Min Read November 22, 2025 CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager to…
Threat Mitigation Vulnerability2 Min Read November 21, 2025 Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation Grafana has released security updates to address a maximum severity security flaw that could allow privilege escalation or user impersonation…
Data Protection Technology3 Min Read November 21, 2025 Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple's…
Data Protection Mobile Security3 Min Read November 21, 2025 Why IT Admins Choose Samsung for Mobile Security Ever wonder how some IT teams keep corporate data safe without slowing down employees? Of course you have. Mobile devices are essential for…
Malware Threat Intelligence5 Min Read November 21, 2025 APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent…
Compliance Cyber Attack2 Min Read November 21, 2025 SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer,…
Data Breach SaaS Security2 Min Read November 21, 2025 Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity Salesforce has warned of detected "unusual activity" related to Gainsight-published applications connected to the platform. "Our investigation…
Cloud Computing Vulnerability3 Min Read November 20, 2025 ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI)…
Botnet Malware3 Min Read November 20, 2025 Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that's targeting Windows users. Active since mid-2025,…
Cybersecurity Hacking News11 Min Read November 20, 2025 ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we've seen arrests, spies at work,…
Online Fraud Web Security2 Min Read November 20, 2025 CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive…
Malware Mobile Security3 Min Read November 20, 2025 New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device…
Cyber Warfare Threat Intelligence3 Min Read November 20, 2025 Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend…
Artificial Intelligence Malvertising3 Min Read November 20, 2025 TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global…
Threat Intelligence Vulnerability2 Min Read November 19, 2025 NHS Warns of PoC Exploit for 7-Zip Symbolic Link–Based RCE Vulnerability Update: The NHS England Digital, in an updated advisory on November 20, 2025, said it has not observed in-the-wild exploitation of…
Cyber Attack Malware4 Min Read November 19, 2025 Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking…
Threat Intelligence Vulnerability2 Min Read November 19, 2025 WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in…
Endpoint Security Network Security4 Min Read November 19, 2025 Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security…
Cyber Espionage Malware3 Min Read November 19, 2025 EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to…
AI Security SaaS Security2 Min Read November 19, 2025 ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts Malicious actors can exploit default configurations in ServiceNow's Now Assist generative artificial intelligence (AI) platform and leverage…
Cloud Security Compliance2 Min Read November 18, 2025 Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale You've probably already moved some of your business to the cloud—or you're planning to. That's a smart move. It helps you work faster,…
Malware Social Engineering2 Min Read November 18, 2025 Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a…
Cyber Espionage Malware3 Min Read November 18, 2025 Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued…
Enterprise Security Zero Trust8 Min Read November 18, 2025 Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF,…
Malware Web Security2 Min Read November 18, 2025 Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service…
Cybersecurity Hacking News20 Min Read November 17, 2025 ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More This week showed just how fast things can go wrong when no one's watching. Some attacks were silent and sneaky. Others used tools we trust…
Cloud Security Social Engineering6 Min Read November 17, 2025 5 Reasons Why Attackers Are Phishing Over LinkedIn Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social…
Malware Vulnerability2 Min Read November 15, 2025 RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow…
Cryptocurrency Cybercrime4 Min Read November 15, 2025 Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting North Korea's illicit revenue…
Malware Threat Intelligence2 Min Read November 14, 2025 North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services…
Artificial Intelligence Vulnerability3 Min Read November 14, 2025 Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference…
Malware Threat Intelligence3 Min Read November 14, 2025 Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the…
Ransomware Threat Intelligence4 Min Read November 14, 2025 Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date.…
AI Security Cyber Espionage3 Min Read November 14, 2025 Chinese Hackers Use Anthropic's AI to Launch Automated Cyber Espionage Campaign State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber…
Threat Intelligence Vulnerability4 Min Read November 14, 2025 Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb Web Application Firewall…
Online Fraud Payment Security4 Min Read November 13, 2025 Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests' Payment Data A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of the year.…
Browser Security Threat Intelligence2 Min Read November 13, 2025 Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to…
Patch Management Threat Intelligence6 Min Read November 13, 2025 When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit…
Botnet Cybercrime1 Min Read November 13, 2025 Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted as part of a coordinated law enforcement…
Cybersecurity Hacking News14 Min Read November 13, 2025 ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories Behind every click, there's a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting…
Network Security Vulnerability2 Min Read November 13, 2025 CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard Fireware to…