Cybersecurity Hacking News13 Min Read December 1, 2025 ⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More Hackers aren't kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email,…
Web Security Zero Trust3 Min Read November 27, 2025 Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update Microsoft has announced plans to improve the security of Entra ID authentication by blocking unauthorized script injection attacks starting a…
Cyber Espionage Malware2 Min Read November 26, 2025 RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed…
Browser Security Cybercrime3 Min Read November 22, 2025 Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new…
Malware Mobile Security3 Min Read November 20, 2025 New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device…
Cybersecurity Hacking News14 Min Read November 13, 2025 ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories Behind every click, there's a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting…
Password Security Threat Detection4 Min Read November 12, 2025 Active Directory Under Siege: Why Critical Infrastructure Needs Stronger Security Active Directory remains the authentication backbone for over 90% of Fortune 1000 companies. AD's importance has grown as companies adopt…
Cybersecurity Hacking News14 Min Read November 3, 2025 Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage…
Incident Response Security Validation3 Min Read October 22, 2025 Bridging the Remediation Gap: Introducing Pentera Resolve From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours, five…
VPN Security Vulnerability3 Min Read October 17, 2025 Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow…
Ransomware4 Min Read October 15, 2025 Software-Tracking Database Project Management Plan for Organizational IT Departments Organizations need to monitor and administer their software throughout departments because today’s technology-based environment requires…
Cloud Security Threat Hunting3 Min Read October 14, 2025 Moving Beyond Awareness: How Threat Hunting Builds Readiness Every October brings a familiar rhythm - pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and…
Apple Ransomware Supply Chain2 Min Read October 14, 2025 iPhone Fold Hinge Costs Drop to $70-$80, Boosting Viability for Mass Production in 2026 The long-rumored foldable iPhone — tentatively referred to as the iPhone Fold — has yet to be officially announced, but numerous…
Cybersecurity Hacking News2 Min Read October 13, 2025 Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More Every week, the cyber world reminds us that silence doesn't mean safety. Attacks often begin quietly — one unpatched flaw, one…
Malware Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Ransomware crims that exploited SharePoint 0-days add Velociraptor to their arsenal The ransomware gang caught exploiting Microsoft SharePoint zero-days over the summer has added a new tool to its arsenal: Velociraptor, an…
Exploits Network Ransomware Vulnerabilities2 Min Read October 10, 2025 Zero-day in file-sharing software leads to RCE, and attacks are ongoing Security research firm Huntress is warning all users of Gladinet's CentreStack and Triofox file-sharing tools to urgently apply an available…
Threat Intelligence Vulnerability3 Min Read October 10, 2025 CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS)…
Cybersecurity Hacking News1 Min Read October 9, 2025 ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation to…
Ransomware Supply Chain5 Min Read October 5, 2025 How Can IT Security Professionals Best Navigate the CMMC Maze? For companies still treating the Cybersecurity Maturity Model Certification (CMMC) as an IT-only concern, the risks are growing. Developed by…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 3, 2025 Google Announces $4 Billion Arkansas Investment for New AI Data Center and 600 MW Solar Project Google has announced plans to invest up to $4 billion in Arkansas by 2027, channeling resources into infrastructure, energy transition, and…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
Ransomware Threat Intelligence2 Min Read October 2, 2025 Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of activity possibly linked to…
IoT Security Ransomware5 Min Read October 1, 2025 Navigating Complexity: CISO Strategies for Security Tool Consolidation and Budget Optimization In the dynamic landscape of modern cybersecurity, Chief Information Security Officers (CISOs) often face a paradoxical challenge: the…
Social Engineering Windows2 Min Read October 1, 2025 Shortcut-based Credential Lures Deliver DLL Implants A campaign that packages credential-themed ZIP archives with malicious Windows shortcut (.lnk) files has been tracked by cybersecurity…
Binance Bitcoin Blockchain Coding Crypto Cryptocurrency Quantum Computing Quantum Resistance Technology6 Min Read October 1, 2025 Quantum Resistance and Coding for a Post-Quantum Bitcoin Bitcoin was created with strong cryptography, based on mathematical problems so complex that even the most powerful computers struggle to…
Artificial Intelligence Attack Surface2 Min Read October 1, 2025 2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising Bitdefender's 2025 Cybersecurity Assessment Report paints a sobering picture of today's cyber defense landscape: mounting pressure to remain…
ICS/OT Zero Trust2 Min Read October 1, 2025 AI Tops Cybersecurity Investment Priorities, PwC Finds AI is now the top investment priority in cybersecurity budgets over the next 12 months, according to a new PwC report. AI-based security was…
Exploits Phishing Ransomware Vulnerabilities4 Min Read September 29, 2025 Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment.…
Artificial Intelligence Enterprise Security5 Min Read September 29, 2025 The State of AI in the SOC 2025 – Insights from Recent Study Security leaders are embracing AI for triage, detection engineering, and threat hunting as alert volumes and burnout hit breaking points. A…
Malware Vulnerabilities Windows2 Min Read September 27, 2025 ChatGPT Pulse Arrives: The Proactive AI Assistant That Reshapes Your Morning Routine OpenAI has introduced a new feature within ChatGPT called “ChatGPT Pulse”, a service designed to deliver personalized daily…
Apple Malware Ransomware Vulnerabilities3 Min Read September 26, 2025 ‘An attacker's playground:’ Crims exploit GoAnywhere perfect-10 bug Security researchers have confirmed that threat actors have exploited the maximum-severity vulnerability affecting Fortra's GoAnywhere managed…
IoT Security Zero Trust2 Min Read September 24, 2025 Artificial Intelligence – Supported Internet of Things Security Milica D. DjekicSeptember 24, 2025 Transforming digital technology landscape and encompassing global product and service marketplace are…
Exploits2 Min Read September 23, 2025 Review: Practical Purple Teaming Practical Purple Teaming is a guide to building stronger collaboration between offensive and defensive security teams. The book focuses on how…
Exploits Ransomware Vulnerabilities2 Min Read September 19, 2025 Ding ding: Fortra rings the perfect-10 bell over latest GoAnywhere MFT bug Budding ransomware crooks have another shot at exploiting Fortra's GoAnywhere MFT product now that a new 10/10 severity vulnerability needs…
Ransomware6 Min Read September 19, 2025 Beyond Tick Boxes: An Auditor’s Perspective on Information Security Compliance Introduction As cyber threats evolve and regulatory requirements tighten, businesses face increasing pressure to protect their sensitive data…
Malware Ransomware4 Min Read September 17, 2025 Deepfakes at the Gate: How Fake Job Applicants Are Becoming a Serious Cyber Threat In recent months, the hiring process has become a new attack surface. Cybercriminals are no longer just spoofing emails or exploiting software…
CA SiteMinder Conditional Access CyberArk Featured ForgeRock Identity and Access Management (IAM) Microsoft Entra ID Multi-Factor Authentication (MFA) Okta PingFederate Privileged Access Management (PAM) QRadar SIEM Ransomware SailPoint Secrets Management Single Sign-On (SSO) Venafi Windows4 Min Read September 16, 2025 Expert Spotlight: Koushik Anand on IAM and PAM Excellence at Enterprise Scale By Gary Miliefsky, Publisher With more than 80% of breaches involving stolen or misused credentials, identity is the control point that…
Exploits ICS/OT Malware Ransomware8 Min Read September 16, 2025 Digital Transformation Failures: A National Security Crisis in the Making In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business…
Cybersecurity Hacking News24 Min Read September 15, 2025 ⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, Supply Chain Breaches, Zero-Days & More In a world where threats are persistent, the modern CISO's real job isn't just to secure technology—it's to preserve institutional trust…
Malware Ransomware Vulnerabilities Windows2 Min Read September 13, 2025 New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems In late July 2025, a series of ransomware samples surfaced on VirusTotal under filenames referencing the notorious Petya and NotPetya attacks.…
Security3 Min Read September 13, 2025 New HybridPetya ransomware can bypass UEFI Secure Boot A recently discovered ransomware strain called HybridPetya can bypass the UEFI Secure Boot feature to install a malicious application on…
Data Breach Ransomware3 Min Read September 12, 2025 ICO Warns of Student-Led Data Breaches in UK Schools Over half (57%) of insider data breaches in UK schools are caused by students, with many children being set up for “a life of cybercrime,” a…