News

This involves deploying a malware strain that connects to a nascent Web3 service called Teneo, a decentralized physical ...
GCP’s ConfusedComposer flaw let attackers escalate privileges via PyPI packages; patched by Google on April 13.
Phishers abused Google Sites and DKIM replay to send valid-signed emails, bypassing filters and stealing credentials.
Security teams must integrate browser security into their enterprise security stack to gain real-time visibility, detect ...
Lotus Panda breached 6 Southeast Asian organizations using custom tools, browser stealers, and sideloaded malware.
Microsoft secures MSA and Entra ID with Azure Confidential VMs + HSM, preventing token forgery and reducing breach risks.
SuperCard X malware exploits NFC relay and social engineering to steal card data in Italy, enabling ATM fraud.
"In some systems, initial access was gained through exploiting the RDP vulnerability (BlueKeep, CVE-2019-0708)," the South ...
From zero-click iOS exploits to NTLM credential leaks and the 4Chan breach — this week’s cyber threats hit where trust runs ...
Proton66-hosted IPs launched global cyberattacks since Jan 8, 2025, exploiting critical CVEs to deploy malware.
The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting ...
The surge in DDoS attack traffic this year has been driven in part by the rapid expansion of IoT devices - from smart watches ...