Posts

XE Hacker Group Exploits VeraCore Zero-Day to Deploy Pe...

Threat actors have been observed exploiting multiple security flaws in various s...

Malicious ML Models on Hugging Face Leverage Broken Pic...

Cybersecurity researchers have uncovered two malicious machine learning (ML) mod...

DeepSeek App Transmits Sensitive User and Device Data W...

A new audit of DeepSeek's mobile app for the Apple iOS operating system has foun...

CISA Warns of Active Exploits Targeting Trimble Citywor...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that...

AI-Powered Social Engineering: Reinvented Threats

The foundations for social engineering attacks – manipulating humans – might not...

Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling...

Microsoft is warning of an insecure practice wherein software developers are inc...

India’s RBI Introduces Exclusive "bank.in" Domain to Co...

India's central bank, the Reserve Bank of India (RBI), said it's introducing an ...

Hackers Exploiting SimpleHelp RMM Flaws for Persistent ...

Threat actors have been observed exploiting recently disclosed security flaws in...

Fake Google Chrome Sites Distribute ValleyRAT Malware v...

Bogus websites advertising Google Chrome have been used to distribute malicious ...

Ransomware Extortion Drops to $813.5M in 2024, Down fro...

Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a...

SparkCat Malware Uses OCR to Extract Crypto Wallet Reco...

A new malware campaign dubbed SparkCat has leveraged a suit of bogus apps on bot...

The Evolving Role of PAM in Cybersecurity Leadership Ag...

Privileged Access Management (PAM) has emerged as a cornerstone of modern cybers...

North Korean APT Kimsuky Uses forceCopy Malware to Stea...

The North Korea-linked nation-state hacking group known as Kimsuky has been obse...

Top 3 Ransomware Threats Active in 2025

You arrive at the office, power up your system, and panic sets in. Every file is...

Cisco Patches Critical ISE Vulnerabilities Enabling Roo...

Cisco has released updates to address two critical security flaws Identity Servi...

Cross-Platform JavaScript Stealer Targets Crypto Wallet...

The North Korea-linked Lazarus Group has been linked to an active campaign that ...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.