Cybercrime Data Breach3 Min Read October 24, 2025 Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1, 2024, targe…
2 Min Read October 24, 2025 Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability Microsoft on Thursday released out-of-band security updates to patch a… Network Security Vulnerability
3 Min Read October 24, 2025 APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign A Pakistan-nexus threat actor has been observed targeting Indian… Cyber Espionage Malware
1 Min Read October 24, 2025 The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently Does your organization suffer from a cybersecurity perception gap?… Cyber Resilience Data Protection
apt28 CVE-2025-27915 ics Stealer XSS Zero-Day2 Min Read October 6, 2025 Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the…
conti CVE-2025-61882 exploit Google Cloud Ransomware Zero-Day2 Min Read October 6, 2025 Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that it said has been exploited in the…
Clop conti CVE-2024-50623 CVE-2024-55956 CVE-2025-61882 exploit Google Cloud leaked PoC Ransomware security update Zero-Day4 Min Read October 6, 2025 Oracle patches EBS zero-day exploited in Clop data theft attacks Oracle is warning about a critical E-Business Suite zero-day vulnerability tracked as CVE-2025-61882 that allows attackers to perform…
CVE-2025-27915 exploit ics XSS Zero-Day3 Min Read October 5, 2025 Hackers exploited Zimbra flaw as zero-day using iCalendar files Researchers monitoring for larger .ICS calendar attachments found that a flaw in Zimbra Collaboration Suite (ZCS) was used in…
Ransomware Supply Chain5 Min Read October 5, 2025 How Can IT Security Professionals Best Navigate the CMMC Maze? For companies still treating the Cybersecurity Maturity Model Certification (CMMC) as an IT-only concern, the risks are growing. Developed by…
Breach leaked Mobile Phishing4 Min Read October 5, 2025 ParkMobile pays… $1 each for 2021 data breach that hit 22 million ParkMobile has finally wrapped up a class action lawsuit over the platform’s 2021 data breach that hit 22 million users. But…
Malware Phishing Ransomware Vulnerabilities8 Min Read October 5, 2025 Week in review: Many Cisco ASA firewalls still unsecure, hackers claim Red Hat’s GitLab breach Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How…
Apple Linux Vulnerabilities Windows2 Min Read October 5, 2025 Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code Unity Technologies has issued a critical security advisory warning developers about a high-severity vulnerability affecting its widely used…
Data Breach Network Ransomware Vulnerabilities5 Min Read October 5, 2025 Addressing the CL0P Extortion Campaign Targeting Oracle E-Business Suite (EBS) Users Cybereason is continuing to investigate. Check the Cybereason blog for additional updates. Overview and What Cybereason Knows So Far…
Hardware Technology2 Min Read October 4, 2025 Leaked Apple iPad Pro M5 benchmark shows massive improvements A new leaked benchmark shows Apple's alleged M5 chip on an iPad, and it's almost as fast as a desktop CPU. We know that Apple is really good…
Artificial Intelligence Technology1 Min Read October 4, 2025 ChatGPT social could be a thing, as leak shows direct messages support OpenAI doesn't want ChatGPT to remain just a chatbot for interacting with a large language model. OpenAI already has Sora 2, which has a…
Artificial Intelligence1 Min Read October 4, 2025 OpenAI rolls out GPT Codex Alpha with early access to new models OpenAI's Codex is already making waves in the vibe coding vertical, and it's now set to get even better. For those unaware, Codex runs in…
Artificial Intelligence1 Min Read October 4, 2025 OpenAI wants ChatGPT to be your emotional support GPT-5 isn't as good as GPT-4o when it comes to emotional support, but that changes today. As first spotted by BleepingComputer, ChatGPT has…
Artificial Intelligence Technology1 Min Read October 4, 2025 OpenAI prepares $4 ChatGPT Go for several new countries OpenAI has been testing a new, cheaper ChatGPT plan called "Go," and it's now rolling out to more regions. We previously thought it…
Linux Malware Vulnerabilities Windows3 Min Read October 4, 2025 500X Surge in Scanning Targets Palo Alto and Cisco ASA Enterprise security teams are on high alert after an extraordinary 500% spike in mass scanning activity was detected against Palo Alto…
Agentic AI Enterprise Security2 Min Read October 4, 2025 CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity's agentic AI browser Comet by…
Security2 Min Read October 4, 2025 Massive surge in scans targeting Palo Alto Networks login portals A spike in suspicious scans targeting Palo Alto Networks login portals indicates clear reconnaissance efforts from suspicious IP addresses,…
Data Breach Network Ransomware Vulnerabilities3 Min Read October 4, 2025 Breaking Point: Storage & Backup Systems Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems Enterprise storage and backup systems have become a…
Android Apple Network Vulnerabilities3 Min Read October 4, 2025 New Study Warns Several Free iOS and Android VPN Apps Leak Data Millions who rely on free mobile Virtual Private Network (VPN) apps for online privacy may actually be putting their data at greater risk,…
Security3 Min Read October 4, 2025 Discord discloses data breach after hackers steal support tickets Hackers stole partial payment information and personally identifiable data, including names and government-issued IDs, from some Discord users…
Security2 Min Read October 4, 2025 Hackers steal identifiable Discord user data in third-party breach Hackers stole partial payment information and personally identifying data associated with some Discord users after compromising a third-party…
Network Security Vulnerability1 Min Read October 4, 2025 Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting Palo Alto Networks login…
Ransomware Supply Chain Vulnerabilities2 Min Read October 4, 2025 Clop Ransomware Targets Oracle E-Business Suite: Extortion Wave Hits Global Enterprises A new wave of extortion attacks linked to the Clop ransomware group has recently shaken organizations using Oracle E-Business Suite (EBS),…
Artificial Intelligence Technology1 Min Read October 3, 2025 Opera wants you to pay $19.90 per month for its new AI browser Opera Neon is a new browser that puts AI in control of your tabs and browsing activities, but it'll cost $19.90 per month. The AI wave is…
Botnet Malware4 Min Read October 3, 2025 Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That's…
Cyber Attack Cyber Crime Cybersecurity Extortion Ransom Security3 Min Read October 3, 2025 Scattered LAPSUS$ Hunters Claim Salesforce Breach, 1B Records, 39 Firms Listed A new leak site has gone live, operated by the notorious group calling itself “Scattered Lapsus$ Hunters,” (a coalition that…
Security2 Min Read October 3, 2025 Signal adds new cryptographic defense against quantum attacks Signal announced the introduction of Sparse Post-Quantum Ratchet (SPQR), a new cryptographic component designed to withstand quantum computing…
AI adoption metrics AI governance Black Hat 2025 CIO and CISO alignment Continuous Monitoring Ransomware Spotlight3 Min Read October 3, 2025 Innovator Spotlight: Singulr AI The AI Governance Tightrope: Enabling Innovation Without Compromising Security Cybersecurity leaders are facing a critical inflection…
ICS/OT Malware Ransomware Vulnerabilities2 Min Read October 3, 2025 Global Exposure of 180,000 ICS/OT Devices Raises Safety Concerns The cybersecurity firm Bitsight has issued a major warning about a rapid increase in critical systems left vulnerable on the public internet.…
Cybercrime Malware4 Min Read October 3, 2025 Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as…
Security2 Min Read October 3, 2025 Renault and Dacia UK warn of data breach impacting customers Customers of Renault and Dacia in the United Kingdom have been notified that sensitive information they shared with the car maker was…
Insider Threats Malware Ransomware5 Min Read October 3, 2025 AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense Quick Summary: AI agents enable security teams to surge ahead of the most advanced threats using automated decision-making, real…
Android Apple Malware Vulnerabilities2 Min Read October 3, 2025 Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud A Chinese-speaking cybercrime group is hijacking trusted Internet Information Services (IIS) worldwide to run SEO scams that redirect users to…
Security2 Min Read October 3, 2025 Japanese beer giant Asahi confirms ransomware attack Japanese beer-making giant Asahi has disclosed today that a ransomware attack caused the IT disruptions that forced it to shut down factories…
Security3 Min Read October 3, 2025 ShinyHunters launches Salesforce data leak site to extort 39 victims An extortion group has launched a new data leak site to publicly extort dozens of companies impacted by a wave of Salesforce breaches,…
Artificial Intelligence Security Software3 Min Read October 3, 2025 CommetJacking attack tricks Comet browser into stealing emails A new attack called 'CometJacking' exploits URL parameters to pass to Perplexity's Comet AI browser hidden instructions that allow…
Cloud Security Phishing Vulnerabilities4 Min Read October 3, 2025 The Good, the Bad and the Ugly in Cybersecurity – Week 40 The Good | UK Convicts “Bitcoin Queen” in World’s Largest Cryptocurrency Seizure This week, a court in the UK convicted…
Ransomware Supply Chain7 Min Read October 3, 2025 Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing In today’s interconnected digital landscape, businesses are more dependent than ever on third-party vendors and partners. While these…
Cl0p Cyber Attack Cyber Attacks Cyber Crime Cybersecurity FIN11 Google Mandiant Ransomware Security2 Min Read October 3, 2025 Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers Cybersecurity experts are on high alert as a group claiming ties to the infamous Cl0p ransomware gang is bombarding companies with emails that…
Security2 Min Read October 3, 2025 Oracle links Clop extortion attacks to July 2025 vulnerabilities Oracle has linked an ongoing extortion campaign claimed by the Clop ransomware gang to E-Business Suite (EBS) vulnerabilities that were…
Malware Online Security2 Min Read October 3, 2025 Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp. The…
Exploits Vulnerabilities2 Min Read October 3, 2025 Hackers Attempting to Exploit Grafana Vulnerability that Enables Arbitrary File Reads Grafana, the popular open-source analytics and visualization platform, has once again become the target of a large‐scale, coordinated…