Cloud Security Data Breach Malware Phishing Ransomware Vulnerabilities5 Min Read August 27, 2025 Online PDF Editors Safe to Use? Detailed Analysis of Security Risks Associated With It Online PDF editors have become common tools for quick document manipulation, providing convenient alternatives to desktop software. However,…
Cyber Espionage Malware3 Min Read August 26, 2025 UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats in Southeast Asia and other entities…
Apple Vulnerabilities3 Min Read August 25, 2025 PoC Exploit & Vulnerability Analysis Released for Apple 0-Day RCE Vulnerability A detailed proof-of-concept exploit and comprehensive vulnerability analysis have been released for CVE-2025-43300, a critical zero-click…
Malware4 Min Read August 25, 2025 Watering Hole Attacks Push ScanBox Keylogger Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based…
Vulnerability Zero-Day4 Min Read August 25, 2025 Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws Microsoft on Tuesday rolled out fixes for a massive set of 111 security flaws across its software portfolio, including one flaw that has been…
Anti-Malware Research9 Min Read October 30, 2024 Unmasking the SYS01 Infostealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages In a world ran by advertising, businesses and organizations are not the only ones using this powerful tool. Cybercriminals have a knack for…