Open Source Vulnerability2 Min Read February 3, 2026 Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package Threat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular "@react-native-community/cli" n…
4 Min Read February 3, 2026 When Cloud Outages Ripple Across the Internet Recent major cloud service outages have been hard to miss. High-profile… Cloud Computing Zero Trust
3 Min Read February 3, 2026 APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks The Russia-linked state-sponsored threat actor known as APT28 (aka… Malware Vulnerability
2 Min Read February 3, 2026 Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox Mozilla on Monday announced a new controls section in its Firefox… Artificial Intelligence Privacy
Data Breach Vulnerability2 Min Read October 23, 2025 Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw E-commerce security company Sansec has warned that threat actors have begun to exploit a recently disclosed security vulnerability in Adobe…
Threat Intelligence Vulnerability1 Min Read October 23, 2025 Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint…
Cyber Espionage Malware1 Min Read October 22, 2025 Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to…
Cybersecurity Malware2 Min Read October 22, 2025 Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations…
Cyber Espionage Vulnerability2 Min Read October 22, 2025 Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications company…
Incident Response Security Validation3 Min Read October 22, 2025 Bridging the Remediation Gap: Introducing Pentera Resolve From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours, five…
Cryptocurrency Software Integrity1 Min Read October 22, 2025 Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package manager with malicious typosquats of Nethereum,…
Data Breach Enterprise Security4 Min Read October 22, 2025 Why You Should Swap Passwords for Passphrases The advice didn't change for decades: use complex passwords with uppercase, lowercase, numbers, and symbols. The idea is to make passwords…
Cyber Espionage Network Security2 Min Read October 22, 2025 Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware Government, financial, and industrial organizations located in Asia, Africa, and Latin America are the target of a new campaign dubbed…
Data Protection Vulnerability3 Min Read October 22, 2025 TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution Cybersecurity researchers have disclosed details of a high-severity flaw impacting the popular async-tar Rust library and its forks, including…
Network Security Vulnerability2 Min Read October 22, 2025 TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution TP-Link has released security updates to address four security flaws impacting Omada gateway devices, including two critical bugs that could…
Cryptocurrency Encryption2 Min Read October 21, 2025 Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams Meta on Tuesday said it's launching new tools to protect Messenger and WhatsApp users from potential scams. To that end, the company said it's…
Malware Vulnerability2 Min Read October 21, 2025 PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign Cybersecurity researchers have shed light on the inner workings of a botnet malware called PolarEdge. PolarEdge was first documented by Sekoia…
Artificial Intelligence Security Operations4 Min Read October 21, 2025 Securing AI to Benefit from AI Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It…
Cyber Espionage Threat Intelligence3 Min Read October 21, 2025 Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025,…
Cyber Espionage Network Security2 Min Read October 21, 2025 Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network A European telecommunications organization is said to have been targeted by a threat actor that aligns with a China-nexus cyber espionage…
Data Security Threat Intelligence2 Min Read October 20, 2025 Five New Exploited Bugs Land in CISA's Catalog — Oracle and Microsoft Among Targets The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities…
Data Breach Phishing Ransomware Vulnerabilities2 Min Read October 20, 2025 Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More It's easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show…
Browser Security Malvertising2 Min Read October 20, 2025 Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches ClickFix, FileFix, fake CAPTCHA — whatever you call it, attacks where users interact with malicious scripts in their web browser are a…
Browser Security Malware2 Min Read October 20, 2025 131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign Cybersecurity researchers have uncovered a coordinated campaign that leveraged 131 rebranded clones of a WhatsApp Web automation extension for…
Cyber Espionage National Security2 Min Read October 20, 2025 MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems China on Sunday accused the U.S. National Security Agency (NSA) of carrying out a "premeditated" cyber attack targeting the National Time…
Cryptocurrency SIM Swapping2 Min Read October 19, 2025 Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its…
Cybercrime Threat Intelligence2 Min Read October 18, 2025 New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a…
Malware Threat Intelligence2 Min Read October 18, 2025 Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to…
Blockchain Malware3 Min Read October 17, 2025 North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its…
Artificial Intelligence Identity Security2 Min Read October 17, 2025 Identity Security: Your First and Last Line of Defense The danger isn't that AI agents have bad days — it's that they never do. They execute faithfully, even when what they're executing is a…
VPN Security Vulnerability3 Min Read October 17, 2025 Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow…
Cybercrime Malware2 Min Read October 17, 2025 Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently…
Blockchain Malware2 Min Read October 16, 2025 North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique…
Cloud Security Malware3 Min Read October 16, 2025 Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the…
Malware Vulnerability2 Min Read October 16, 2025 LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit…
Artificial Intelligence Data Privacy9 Min Read October 16, 2025 Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform Scaling the SOC with AI - Why now? Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR's AI-SOC Market…
Linux Vulnerability2 Min Read October 16, 2025 Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in "Zero Disco' Attacks Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS…
Data Protection Penetration Testing3 Min Read October 16, 2025 Beware the Hidden Costs of Pen Testing Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach.…
Data Breach Ransomware Supply Chain2 Min Read October 16, 2025 Over 23 Million Victims Hit by Data Breaches in Q3 The number of US corporate data breaches and downstream victims appeared to slow in the third quarter of the year, according to new data from…
Cybersecurity Hacking News15 Min Read October 16, 2025 ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it's become to turn everyday technology into a…
Linux Ransomware Vulnerabilities Windows2 Min Read October 16, 2025 Critical Samba RCE Vulnerability Enables Arbitrary Code Execution Samba has disclosed a severe remote code execution (RCE) flaw that could allow attackers to hijack Active Directory domain controllers.…
Botnets Cloud Security Ransomware Vulnerabilities3 Min Read October 16, 2025 F5 Reveals Nation State Breach and Urges Immediate Patching The US government has urged federal agencies to take immediate action after security vendor F5 revealed it has been breached by a nation-state…
Cloud Security DDoS Vulnerabilities Windows10 Min Read October 16, 2025 October 2025 Patch Tuesday: Two Publicly Disclosed, Three Zero-Days, and Eight Critical Vulnerabilities Among 172 CVEs Microsoft has addressed 172 vulnerabilities in its October 2025 security update release, marking the highest number of vulnerabilities patched…
Malware Ransomware Supply Chain Vulnerabilities2 Min Read October 16, 2025 CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a severe code execution vulnerability in…
Exploits Mobile Security Vulnerabilities Windows2 Min Read October 16, 2025 Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature Microsoft has disclosed two critical vulnerabilities in its Windows BitLocker encryption feature, allowing attackers with physical access to…
Data Security Vulnerability1 Min Read October 16, 2025 CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Adobe Experience…