Open Source Vulnerability2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "@react-native-community/cli" n…
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
3 Min Read February 3, 2026 APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks The Russia-linked state-sponsored threat actor known as APT28 (aka… Malware Vulnerability
2 Min Read February 3, 2026 Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox Mozilla on Monday announced a new controls section in its Firefox… Artificial Intelligence Privacy
Malware Software Supply Chain6 Min Read November 13, 2025 Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake…
Cybercrime Malware3 Min Read November 12, 2025 Google Sues China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based hackers who are…
Network Security Zero-Day2 Min Read November 12, 2025 Amazon Uncovers Attacks Exploited Cisco ISE and Citrix NetScaler as Zero-Day Flaws Amazon's threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two then-zero-day security flaws…
Risk Management Threat Detection2 Min Read November 12, 2025 [Webinar] Learn How Leading Security Teams Reduce Attack Surface Exposure with DASR Every day, security teams face the same problem—too many risks, too many alerts, and not enough time. You fix one issue, and three more…
Password Security Threat Detection4 Min Read November 12, 2025 Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security Active Directory remains the authentication backbone for over 90% of Fortune 1000 companies. AD's importance has grown as companies adopt…
Patch Tuesday Vulnerability3 Min Read November 12, 2025 Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack Microsoft on Tuesday released patches for 63 new security vulnerabilities identified in its software, including one that has come under active…
Malware Network Security3 Min Read November 11, 2025 GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from…
AI Security Regulatory Compliance6 Min Read November 11, 2025 CISO's Expert Guide To AI Supply Chain Attacks AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs must do now to protect…
Malware Software Supply Chain2 Min Read November 11, 2025 Researchers Detect Malicious npm Package Targeting GitHub-Owned Repositories Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate "@actions/artifact"…
Cybersecurity Hacking News14 Min Read November 10, 2025 ⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More Cyber threats didn't slow down last week—and attackers are getting smarter. We're seeing malware hidden in virtual machines,…
Browser Security Enterprise Security4 Min Read November 10, 2025 New Browser Security Report Reveals Emerging Threats for Enterprises According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in…
Data Protection Network Security4 Min Read November 8, 2025 Microsoft Uncovers 'Whisper Leak' Attack That Identifies AI Chat Topics in Encrypted Traffic Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with…
Mobile Security Vulnerability4 Min Read November 7, 2025 Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a "commercial-grade" Android spyware…
Cyber Espionage Malware5 Min Read November 7, 2025 From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term…
Malware Supply Chain Attack3 Min Read November 7, 2025 Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and…
Cloud Security Data Protection4 Min Read November 7, 2025 Enterprise Credentials at Risk – Same Old, Same Old? Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She…
Data Protection Malware3 Min Read November 7, 2025 Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts Google on Thursday said it's rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by…
Malware Supply Chain Attack3 Min Read November 7, 2025 Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to…
Malware Vulnerability3 Min Read November 6, 2025 Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks…
Vulnerability Zero-Day2 Min Read November 6, 2025 Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 Cisco on Wednesday disclosed that it became aware of a new attack variant that's designed to target devices running Cisco Secure Firewall…
Compliance Threat Intelligence5 Min Read November 6, 2025 From Tabletop to Turnkey: Building Cyber Resilience in Financial Services Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational…
Cybersecurity Hacking News11 Min Read November 6, 2025 ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More Cybercrime has stopped being a problem of just the internet — it's becoming a problem of the real world. Online scams now fund organized…
United States3 Min Read November 6, 2025 Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response…
Malware Network Security2 Min Read November 6, 2025 Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and…
Cloud Security Incident Response2 Min Read November 6, 2025 SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure…
Artificial Intelligence Vulnerability5 Min Read November 5, 2025 Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI's ChatGPT artificial intelligence (AI) chatbot that…
Enterprise IT Mobile Security3 Min Read November 5, 2025 Securing the Open Android Ecosystem with Samsung Knox Raise your hand if you've heard the myth, "Android isn't secure." Android phones, such as the Samsung Galaxy, unlock new ways of working. But,…
Cyber Espionage Cybersecurity3 Min Read November 5, 2025 Mysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting…
Cybercrime Ransomware3 Min Read November 5, 2025 U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud The U.S. Treasury Department on Tuesday imposed sanctions against eight individuals and two entities within North Korea's global financial…
Data Security Threat Intelligence4 Min Read November 5, 2025 Why SOC Burnout Can Be Avoided: Practical Steps Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing…
Supply Chain Security Vulnerability2 Min Read November 4, 2025 Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks Details have emerged about a now-patched critical security flaw in the popular "@react-native-community/cli" npm package that could be…
Apple Exploits Vulnerabilities Windows2 Min Read November 4, 2025 Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed Cybersecurity researchers have disclosed details of four security flaws in Microsoft Teams that could have exposed users to serious…
Cybercrime Threat Detection8 Min Read November 4, 2025 Ransomware Defense Using the Wazuh Open Source Platform Ransomware is malicious software designed to block access to a computer system or encrypt data until a ransom is paid. This cyberattack is one…
Cybercrime Supply Chain Attack2 Min Read November 3, 2025 Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and…
Cybersecurity Hacking News14 Min Read November 3, 2025 Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage…
Exposure Management SOC Operations1 Min Read November 3, 2025 The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations Security Operations Centers (SOC) today are overwhelmed. Analysts handle thousands of alerts every day, spending much time chasing false…
Malware Mobile Security3 Min Read November 3, 2025 Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting…
Cybersecurity Malware3 Min Read November 3, 2025 New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely…
Artificial Intelligence Vulnerability2 Min Read November 1, 2025 ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE devices in the…
Artificial Intelligence Code Security2 Min Read October 31, 2025 OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically OpenAI has announced the launch of an "agentic security researcher" that's powered by its GPT-5 large language model (LLM) and is programmed…
Browser Security Malware3 Min Read October 31, 2025 Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack A suspected nation-state threat actor has been linked to the distribution of a new malware called Airstalk as part of a likely supply chain…
Malware Threat Intelligence3 Min Read October 31, 2025 China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats A China-affiliated threat actor known as UNC6384 has been linked to a fresh set of attacks exploiting an unpatched Windows shortcut…