Archives
- 05 Sep 2025-09-05 Daily Vulns
- 04 Sep Severe Hikvision HikCentral Product Flaws What You Need to Know
- 04 Sep Scattered Lapsus$ Hunters Demand Google Fire Security Experts or Face Data Leak
- 04 Sep NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data
- 04 Sep GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
- 04 Sep CMS Provider Sitecore Patches Exploited Critical Zero Day
- 03 Sep US offers $10 million bounty for info on Russian FSB hackers
- 03 Sep Russian APT28 Expands Arsenal with 'NotDoor' Outlook Backdoor
- 03 Sep RapperBot Hijacking Devices to Launch DDoS Attack In a Split Second
- 03 Sep Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats
- 03 Sep Google fixes actively exploited Android flaws in September update
- 02 Sep Ukrainian Network FDN3 Launches Massive Brute-Force Attacks on SSL VPN and RDP Devices
- 02 Sep New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
- 02 Sep New Phishing Attack Via OneDrive Attacking C-level Employees for Corporate Credentials
- 02 Sep Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments
- 02 Sep Azure AD Credentials Exposed in Public App Settings File
- 02 Sep 2025-09-02 Daily Vulns
- 01 Sep Supply-chain attack hits Zscaler via Salesloft Drift, leaking customer info
- 01 Sep Silver Fox Exploits Signed Drivers to Deploy ValleyRAT Backdoor
- 01 Sep Hidden Commands in Images Exploit AI Chatbots and Steal Data
- 01 Sep Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization
- 01 Sep Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
- 30 Aug 2025-08-30 Daily Vulns
- 29 Aug WhatsApp patches vulnerability exploited in zero-day attacks
- 29 Aug TransUnion Data Breach Impacts 4.5 Million US Customers
- 29 Aug 2025-08-29 Daily Vulns
- 28 Aug Pondering my ORB - A look at PolarEdge Adjacent Infrastructure
- 28 Aug Police seize VerifTools fake ID marketplace servers, domains
- 28 Aug Microsoft Unveils Storm-0501’s Advanced Cloud Ransomware Attack Tactics
- 28 Aug Kea DHCP Server Vulnerability Let Remote Attacker Crash With a Single Crafted Packet
- 28 Aug International coalition calls out three Chinese companies over hacking campaign
- 28 Aug CISA Publish Hunting and Mitigation Guide to Defend Networks from Chinese State-Sponsored Actors
- 28 Aug 2025-08-28 Daily Vulns
- 27 Aug Velociraptor incident response tool abused for remote access
- 27 Aug Personal details of Church of England abuse victims leaked, say survivors
- 27 Aug New Phishing Campaign Abuses ConnectWise ScreenConnect to Take Over Devices
- 27 Aug New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks
- 27 Aug Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors
- 27 Aug AI-Powered Ransomware Has Arrived With 'PromptLock'
- 27 Aug 2025-08-27 Daily Vulns
- 26 Aug MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers
- 26 Aug Hackers steal data from Salesforce instances in widespread campaign
- 26 Aug Crypto thief earns additional prison time for assaulting witness
- 25 Aug Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing
- 25 Aug Nissan confirms design studio data breach claimed by Qilin ransomware
- 25 Aug Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered
- 25 Aug Hook Version 3 The Banking Trojan with The Most Advanced Capabilities
- 25 Aug Fake macOS Help Sites Seek to Spread Infostealer in Targeted Campaign
- 25 Aug Critical Docker Desktop flaw lets attackers hijack Windows hosts
- 25 Aug Credential harvesting campaign targets ScreenConnect cloud administrators
- 25 Aug ClickFix Attack Tricks AI Summaries Into Pushing Malware
- 25 Aug Australian university used Wi-Fi location data to identify student protestors
- 25 Aug Anatsa Android Banking Trojan Now Targeting 830 Financial Apps
- 24 Aug New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection
- 24 Aug Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot
- 22 Aug Large Interpol Cybercrime Crackdown in Africa Leads to the Arrest of Over 1,200 Suspects
- 22 Aug Criminal background checker APCS faces data breach
- 22 Aug Attackers Abuse Virtual Private Servers to Compromise SaaS Accounts
- 22 Aug APT36 hackers abuse Linux .desktop files to install malware in new attacks
- 21 Aug Scattered Spider hacker gets sentenced to 10 years in prison
- 21 Aug Orange Data Breach Raises SIM-Swapping Attack Fears
- 21 Aug Hackers Weaponize QR Codes Embedded with Malicious Links to Steal Sensitive Information
- 21 Aug Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger
- 21 Aug Apple rushes out fix for active zero-day in iOS and macOS
- 21 Aug 2025-08-21 Daily Vulns
- 20 Aug Major password managers can leak logins in clickjacking attacks
- 20 Aug Flaws in Software Used by Hundreds of Cities and Towns Exposed Sensitive Data
- 20 Aug FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage
- 20 Aug 2025-08-20 Daily Vulns
- 19 Aug Threat Actors Attacking Organizations Key Employees With Weaponized Copyright Documents to Deliver Noodlophile Stealer
- 19 Aug Oregon man charged with administering “Rapper Bot” DDoS-for-hire Botnet
- 19 Aug New Research Links VPN Apps, Highlights Security Deficiencies
- 19 Aug Like burglars closing a door, Apache ActiveMQ attackers patch critical vuln after breaking in
- 19 Aug Legitimate Chrome VPN Extension Turns to Browser Spyware
- 19 Aug From Campus to C2 Tracking a Persistent Chinese Operation Against Vietnamese Universities
- 18 Aug Web Hosting Firms in Taiwan Attacked by Chinese APT for Access to High-Value Targets
- 18 Aug Someone's poking the bear with infostealers targeting Russian crypto developers
- 18 Aug New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay
- 18 Aug Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware
- 18 Aug Man Jailed for 20 Months After Compromising Millions of Accounts
- 16 Aug Researcher to release exploit for full auth bypass on FortiWeb
- 16 Aug EncryptHub Abuses Brave Support in new Campaign Exploiting- MSC Eviltwin Flaw
- 16 Aug APT Group UAT-7237 Targets Taiwan's Web Infrastructure with Custom Tools
- 16 Aug 2025-08-16 Daily Vulns
- 15 Aug UK-based Telecommunications Company Colt Technology Services Hit by Major Cyberattack
- 15 Aug Cyberattack on Dutch prosecution service is keeping speed cameras offline
- 15 Aug Critical RCE Vulnerability in Cisco Firewall Management Software Under Active Exploitation
- 14 Aug PhantomCard New NFC-driven Android malware emerging in Brazil
- 14 Aug Cybersecurity in Focus Recent Threats Targeting India Amid Independence Day Celebrations
- 14 Aug Blue Locker' Analysis Ransomware Targeting Oil & Gas Sector In Pakistan
- 14 Aug 2025-08-14 Daily Vulns
- 13 Aug Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics
- 12 Aug New Ransomware Charon Uses Earth Baxia APT Techniques to Target Enterprises
- 12 Aug New 'Curly COMrades' APT Using NGEN COM Hijacking in Georgia, Moldova Attacks
- 12 Aug Microsoft August 2025 Patch Tuesday fixes one zero-day, 107 flaws
- 12 Aug Malvertising campaign leads to PS1Bot, a multi-stage malware framework
- 11 Aug Update WinRAR tools now RomCom and others exploiting zero-day vulnerability
- 11 Aug North Korean Kimsuky hackers exposed in alleged data breach
- 11 Aug Netherlands Citrix NetScaler Flaw CVE-2025-6543 Exploited to Breach Critical Organizations
- 11 Aug Cybersecurity Firm Profero Cracks DarkBit Ransomware Encryption
- 11 Aug Chairmen' of $100 million scam operation extradited to US
- 11 Aug 2025-08-11 Daily Vulns
- 10 Aug New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP
- 10 Aug Google's August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild
- 10 Aug 2025-08-10 Daily Vulns
- 08 Aug UK secretly allows facial recognition scans of passport, immigration databases
- 08 Aug U.S. Judiciary confirms breach of court electronic records service
- 06 Aug Unmasking SocGholish Silent Push Untangles the Malware Web Behind the “Pioneer of Fake Updates” and Its Operator, TA569
- 06 Aug Ukraine claims to have hacked secrets from Russia's newest nuclear submarine
- 06 Aug The Growing Threat of Mobile Infostealers
- 06 Aug Shared secret EDR killer in the kill chain
- 06 Aug OWASP AIVSS targets agentic AI risk
- 06 Aug KLM Confirms Customer Data Breach Linked to Third-Party System
- 06 Aug Google suffers data breach in ongoing Salesforce data theft attacks
- 06 Aug Critical Vulnerability Impacting Over 100K Sites Patched in Everest Forms Plugin
- 05 Aug SonicWall investigates possible zero-day amid Akira ransomware surge
- 05 Aug Smart Contract Scams | Ethereum Drainers Pose as Trading Bots to Steal Crypto
- 05 Aug ReVault! When your SoC turns against you…
- 05 Aug Rapid Breach Social Engineering to Remote Access in 300 Seconds
- 05 Aug Makop Ransomware Identified in Attacks in South Korea
- 05 Aug GenAI Used For Phishing Websites Impersonating Brazil’s Government
- 05 Aug From the Depths of the Shadows IRGC and Hacker Collectives Of The 12-Day War
- 05 Aug From Bing Search to Ransomware Bumblebee and AdaptixC2 Deliver Akira
- 05 Aug Cursor IDE Persistent Code Execution via MCP Trust Bypass
- 05 Aug Cisco Says User Data Stolen in CRM Hack
- 04 Aug Tracking Updates to Raspberry Robin
- 04 Aug ShadowSyndicate Infrastructure Used by Multiple Ransomware Groups Including Cl0p, LockBit and RansomHub
- 04 Aug Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives
- 04 Aug New Plague Linux malware stealthily maintains SSH access
- 04 Aug Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons
- 04 Aug LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code
- 04 Aug Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
- 04 Aug Fingerprinting Malware C2s with Tags
- 03 Aug Fake Telegram Premium Site Distributes New Lumma Stealer Variant
- 02 Aug 2025-08-02 Daily Vulns
- 01 Aug Search Engines are Indexing ChatGPT Conversations! – Here is our OSINT Research
- 01 Aug Hackers Regularly Exploit Vulnerabilities Before Public Disclosure, Study Finds
- 01 Aug Critical Vulnerability in NestJS Devtools Localhost RCE via Sandbox Escape
- 01 Aug Arctic Wolf Observes July 2025 Uptick in Akira Ransomware Activity Targeting SonicWall SSL VPN
- 01 Aug AI-powered Cursor IDE vulnerable to prompt-injection attacks
- 01 Aug AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown
- 01 Aug 2025-08-01 Daily Vulns
- 31 Jul Using LLMs as a reverse engineering sidekick
- 31 Jul Unmasking Interlock Group's Evolving Malware Arsenal
- 31 Jul The Commented Kill Chain Why Old Ransomware Playbooks Never Die
- 31 Jul Ransomware in Q2 2025 AI Joins the Crew, Cartels Rise, and Payment Rates Collapse
- 31 Jul Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing
- 31 Jul Frozen in transit Secret Blizzard’s AiTM campaign against diplomats
- 31 Jul From Laptops to Laundromats How DPRK IT Workers Infiltrated the Global Remote Economy
- 31 Jul Dahua Camera flaws allow remote hacking. Update firmware now
- 31 Jul Before ToolShell Exploring Storm-2603’s Previous Ransomware Operations
- 31 Jul APT36 Expands Beyond Military New Attacks Hit Indian Railways, Oil & Government Systems
- 31 Jul 2025-07-31 Daily Vulns
- 30 Jul UNC2891 Bank Heist Physical ATM Backdoor & Linux Forensic Evasion Evasion
- 30 Jul ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
- 30 Jul Scammers Unleash Flood of Slick Online Gaming Sites
- 30 Jul Qwins Ltd Bulletproof Hosting Provider Powering Global Malware Campaigns
- 30 Jul Exploiting Direct Send Attackers Abuse Microsoft 365 to Deliver Internal Phishing Attacks
- 30 Jul Cobalt Strike Beacon delivered via GitHub and social media
- 30 Jul China’s Covert Capabilities | Silk Spun From Hafnium
- 30 Jul Behind Random Words DoubleTrouble Mobile Banking Trojan Revealed
- 30 Jul Anubis and the Death of Data A New Era of Ransomware Operations
- 30 Jul 2025-07-30 Daily Vulns
- 29 Jul UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure
- 29 Jul Struts Devmode in 2025? Critical Pre-Auth Vulnerabilities in Adobe Experience Manager Forms
- 29 Jul Organizations Warned of Exploited PaperCut Flaw
- 29 Jul JSCEAL Targets Crypto App Users – A New Threat in the Cyber Security Landscape
- 29 Jul GOLD BLADE remote DLL sideloading attack deploys RedLoader
- 29 Jul Deepfakes and Unkept Promises lead to Financial Fraud on Social Media, targeting the General Public
- 29 Jul Cybercriminals Attack Seychelles – Offshore Banking as a Target
- 29 Jul Auto-Color Backdoor How Darktrace Thwarted a Stealthy Linux Intrusion
- 29 Jul Attacking GenAI applications and LLMs – Sometimes all it takes is to ask nicely!
- 29 Jul Attackers Actively Exploiting Critical Vulnerability in Alone Theme
- 29 Jul 2025-07-29 Daily Vulns
- 28 Jul ToxicPanda The Android Banking Trojan Targeting Europe
- 28 Jul Stack Overflows, Heap Overflows, and Existential Dread (SonicWall SMA100 CVE-2025-40596, CVE-2025-40597 and CVE-2025-40598)
- 28 Jul Russia's Aeroflot cancels flights after pro-Ukrainian hackers claim massive cyberattack
- 28 Jul Revisiting UNC3886 Tactics to Defend Against Present Risk
- 28 Jul RedHook A New Android Banking Trojan Targeting Users in Vietnam
- 28 Jul Cybersecurity Scams Targeting Fans and Teams at the 2025 Belgian Grand Prix
- 28 Jul China-linked group Fire Ant exploits VMware and F5 flaws since early 2025
- 27 Jul Scattered Spider is running a VMware ESXi hacking spree
- 26 Jul Researchers Expose Massive Online Fake Currency Operation in India
- 26 Jul RAVEN STEALER UNMASKED Telegram-Based Data Exfiltration
- 26 Jul Hackers Exploit Official Gaming Mouse Software to Spread Windows-based Xred Malware
- 26 Jul Florida Student Research Deploys AI to Spot Stealthy Android Malware
- 26 Jul 2025-07-26 Daily Vulns
- 25 Jul ToolShell, SharePoint, and the Death of the Patch Window
- 25 Jul Methods to Bypass OTP in Mobile Apps Successful VAPT Scenarios
- 25 Jul Hunting Laundry Bear Infrastructure Analysis Guide and Findings
- 25 Jul Citrix NetScaler Devices Memory Leak CVE-2025-5777
- 25 Jul Arizona Woman Sentenced to 8 Years for Orchestrating $17 million North Korean Remote Work Scam
- 25 Jul 2025-07-25 Daily Vulns
- 24 Jul Unmasking the new Chaos RaaS group attacks
- 24 Jul ToolShell An all-you-can-eat buffet for threat actors
- 24 Jul DNS Packet Inspection for Network Threat Hunters
- 24 Jul Cyber Stealer Analysis When Your Malware Developer Has FOMO About Features
- 24 Jul A Spike in the Desert How GreyNoise Uncovered a Global Pattern of VOIP-Based Telnet Attacks
- 24 Jul 2025-07-24 Daily Vulns
- 23 Jul US nuclear weapons agency hacked in Microsoft SharePoint attacks
- 23 Jul Surveillance Malware Hidden in npm and PyPI Packages Targets Developers with Keyloggers, Webcam Capture, and Credential Theft
- 23 Jul Signed, Sealed, Altered? Deepdive into PDF Tempering
- 23 Jul Ports are getting smarter and more hackable
- 23 Jul Operation CargoTalon UNG0901 Targets Russian Aerospace & Defense Sector using EAGLET implant.
- 23 Jul Key figure behind major Russian-speaking cybercrime forum targeted in Ukraine
- 23 Jul Illusory Wishes China-nexus APT Targets the Tibetan Community
- 23 Jul HAFNIUM-Linked Hacker Xu Zewei Riding the Tides of China’s Cyber Ecosystem
- 23 Jul Gunra Ransomware Emerges with New DLS
- 23 Jul Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities LOLBAS, VLC Player, and Encrypted Shellcode
- 23 Jul Critical Vulnerabilities Found in Tridium Niagara Framework
- 23 Jul Account Takeover Vulnerability Affecting Over 400K Installations Patched in Post SMTP Plugin
- 23 Jul A Special Mission to Nowhere, Exploiting the Middle East crisis with a charter jet scam
- 23 Jul 2025-07-23 Daily Vulns
- 22 Jul The Rise of Acreed Infostealer in the Post-LummaC2 Threat Landscape
- 22 Jul Ransomware Group Uses AI Chatbot to Intensify Pressure on Victims
- 22 Jul How We Accidentally Discovered a Remote Code Execution Vulnerability in ETQ Reliance
- 22 Jul How DEF CON hacking villages help to save the planet
- 22 Jul Coyote in the Wild First-Ever Malware That Abuses UI Automation
- 22 Jul Clickfix on macOS AppleScript Malware Campaign Uses Terminal Prompts to Steal Data
- 22 Jul Back to Business Lumma Stealer Returns with Stealthier Methods
- 22 Jul BIDI Swap Unmasking the Art of URL Misleading with Bidirectional Text Tricks
- 22 Jul 2025-07-22 Daily Vulns
- 21 Jul The SOC files Rumble in the jungle or APT41’s new target in Africa
- 21 Jul The Internet Red Button a 2016 Bug Still Lets Anyone Kill Solar Farms in 3 Clicks
- 21 Jul NET RFQ Request for Quote Scammers Casting Wide Net to Steal Real Goods
- 21 Jul Microsoft Fix Targets Attacks on SharePoint Zero-Day
- 21 Jul Lookout Discovers Iranian APT MuddyWater Leveraging DCHSpy During Israel-Iran Conflict
- 21 Jul Livewire Flaw Puts Millions of Laravel Apps at Risk of RCE Attacks
- 21 Jul Four new Android spyware samples linked to Iran's intel agency
- 21 Jul Dell confirms breach of test lab platform by World Leaks extortion group
- 20 Jul 2025-07-20 Daily Vulns
- 19 Jul 2025-07-19 Daily Vulns
- 18 Jul UK calls out Russian military intelligence for use of espionage tool
- 18 Jul Malware Identified in Attacks Exploiting Ivanti Connect Secure Vulnerabilities
- 18 Jul How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies
- 18 Jul Greedy Sponge Targets Mexico with AllaKore RAT and SystemBC
- 18 Jul Getting to the Crux (Ransomware) of the Matter
- 18 Jul Follow-Up Cisco Updates Advisory with Additional Maximum Severity Unauthenticated RCE in ISE and ISE-PIC (CVE-2025-20337)
- 18 Jul CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
- 18 Jul 2025-07-18 Daily Vulns
- 17 Jul WordPress Redirect Malware Hidden in Google Tag Manager Code
- 17 Jul Threat hunting case study Lumma infostealer
- 17 Jul The Linuxsys Cryptominer
- 17 Jul NVIDIAScape - Critical NVIDIA AI Vulnerability A Three-Line Container Escape in NVIDIA Container Toolkit (CVE-2025-23266)
- 17 Jul Mobile Forensics Tool Used by Chinese Law Enforcement Dissected
- 17 Jul MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities
- 17 Jul GhostContainer backdoor malware compromising Exchange servers of high-value organizations in Asia
- 17 Jul Flaw in Signal App Clone Could Leak Passwords — GreyNoise Identifies Active Reconnaissance and Exploit Attempts
- 17 Jul Fake Receipts Generators the rising threat to major retail brands
- 17 Jul CryptoJacking is dead, long live CryptoJacking
- 17 Jul British spies and SAS named in Afghan data breach
- 17 Jul 2025-07-17 Daily Vulns
- 16 Jul UNG0002, Regional Threat Operations Tracked Across Multiple Asian Jurisdictions
- 16 Jul Turbulence at Air Serbia, the latest airline under cyber siege
- 16 Jul Salt Typhoon breach Chinese APT compromises U.S. Army National Guard network
- 16 Jul Phish and Chips China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting
- 16 Jul Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor
- 16 Jul Old Miner, New Tricks H2miner Resurfaces with Lcrypt0rx Ransomware
- 16 Jul Global operation targets NoName057(16) pro-Russian cybercrime network
- 16 Jul From a Teams Call to a Ransomware Threat Matanbuchus 3.0 MaaS Levels Up
- 16 Jul 2025-07-16 Daily Vulns
- 15 Jul Zyxel security advisory for path traversal vulnerability in APs
- 15 Jul Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
- 15 Jul Tracking Protestware Spread 28 npm Packages Affected by Payload Targeting Russian-Language Users
- 15 Jul Threat Actors Exploit SVG Files in Stealthy JavaScript Redirects
- 15 Jul On the Move Fast Flux in the Modern Threat Landscape
- 15 Jul Konfety Returns Classic Mobile Threat with New Evasion Techniques
- 15 Jul Hyper-volumetric DDoS attacks skyrocket Cloudflare’s 2025 Q2 DDoS threat report
- 15 Jul 2025-07-15 Daily Vulns
- 14 Jul eSIM Vulnerability in Kigen's eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks
- 14 Jul The Good, the Bad, and the Encoding An SS7 Bypass Attack
- 14 Jul KongTuke FileFix Leads to New Interlock RAT Variant
- 14 Jul Google Gemini Tricked Into Showing Phishing Message Hidden in Email
- 14 Jul Global Louis Vuitton data breach impacts UK, South Korea, and Turkey
- 14 Jul GLOBAL GROUP Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates
- 14 Jul Forensic journey Breaking down the UserAssist artifact structure
- 14 Jul DOGE Denizen Marko Elez Leaked API Key for xAI
- 14 Jul Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
- 14 Jul Behind the Clouds Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
- 13 Jul Nvidia warns its GPUs – even Blackwells – need protection against Rowhammer attacks
- 13 Jul Chasing Ghosts Over RDP Lateral Movement in Tiny Bitmaps
- 12 Jul OCTALYN STEALER UNMASKED
- 12 Jul 2025-07-12 Daily Vulns
- 11 Jul Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
- 11 Jul GAO finds progress in cyber information sharing, warns of rising attacks on critical infrastructure
- 11 Jul 2025-07-11 Daily Vulns
- 10 Jul macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
- 10 Jul Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild
- 10 Jul Where Everybody Knows Your Name Observing Malice-Complicit Nameservers
- 10 Jul Rendershock Weaponizing Trust in File Rendering Pipelines
- 10 Jul Ransomware Delivered Through GitHub A PowerShell-Powered Attack
- 10 Jul Malware of the Day – Multi-Modal C2 Communication – Numinon C2
- 10 Jul July Patch Tuesday offers 127 fixes
- 10 Jul Fix the Click Preventing the ClickFix Attack Vector
- 10 Jul Dark Web Profile Arkana Ransomware
- 10 Jul Code highlighting with Cursor AI for $500,000
- 10 Jul At last, a use case for AI agents with sky-high ROI Stealing crypto
- 10 Jul Asus and Adobe vulnerabilities
- 10 Jul AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs
- 10 Jul 2025-07-10 Daily Vulns
- 09 Jul Server with Rockerbox Tax Firm Data Exposed 286GB of Records
- 09 Jul Risky Bulletin Browser extensions hijacked for web scraping botnet
- 09 Jul PerfektBlue 1-click RCE attack
- 09 Jul GreyNoise Identifies New Scraper Botnet Concentrated in Taiwan
- 09 Jul GitHub Abused to Spread Malware Disguised as Free VPN
- 09 Jul Critical RCE Vulnerability in mcp-remote CVE-2025-6514 Threatens LLM Clients
- 09 Jul Count(er) Strike – Data Inference Vulnerability in ServiceNow
- 09 Jul Attackers Inject Code into WordPress Theme to Redirect Visitors
- 08 Jul Researchers Reveal 18 Malicious Chrome and Edge Extensions Disguised as Everyday Tools
- 08 Jul RDAP and BGP in Investigative Journalism
- 08 Jul Pay2Key’s Resurgence Iranian Cyber Warfare Targets the West
- 08 Jul Malicious pull request infects VS Code extension
- 08 Jul GoldMelody’s Hidden Chords Initial Access Broker In-Memory IIS Modules Revealed
- 08 Jul From Click to Compromise Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
- 08 Jul Combolists and ULP Files on the Dark Web A Secondary and Unreliable Source of Information about Compromises
- 08 Jul Animation-Driven Tapjacking on Android
- 08 Jul Anatsa Targets North America; Uses Proven Mobile Campaign Process
- 08 Jul 2025-07-08 Daily Vulns
- 07 Jul NordDragonScan Quiet Data-Harvester on Windows
- 07 Jul Hackers abuse leaked Shellter red team tool to deploy infostealers
- 07 Jul Digging Gold with a Spoon – Resurgence of Monero-mining Malware
- 07 Jul Deploying NetSupport RAT via WordPress & ClickFix
- 07 Jul CVE-2025-5777 CitrixBleed 2 Write-Up… Maybe?
- 07 Jul Batavia spyware steals data from Russian organizations
- 07 Jul BERT Ransomware Group Targets Asia and Europe on Multiple Platforms
- 06 Jul Critical vulnerabilities in NetScaler ADC exploited in-the-wild everything you need to know
- 05 Jul Unmasking Insecure HTTP Data Leaks in Popular Chrome Extensions
- 05 Jul Ingram Micro outage caused by SafePay ransomware attack
- 04 Jul Phishing Attack Deploying Malware on Indian Defense BOSS Linux
- 04 Jul NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
- 04 Jul How Much More Must We Bleed? - Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777)
- 04 Jul Critical Sudo bugs expose major Linux distros to local Root exploits
- 04 Jul 2025-07-04 Daily Vulns
- 03 Jul When Installers Turn Evil The Pascal Script Behind Inno Setup Malware Campaign
- 03 Jul 2025-07-03 Daily Vulns
- 02 Jul macOS NimDoor | DPRK Threat Actors Target Web3 and Crypto Platforms with Nim-Based Malware
- 02 Jul Silent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign
- 02 Jul Qantas confirms customer data breach amid Scattered Spider attacks
- 02 Jul June's Dark Gift The Rise of Qwizzserial
- 02 Jul Gamaredon in 2024 Cranking out spearphishing campaigns against Ukraine with an evolved toolset
- 02 Jul Exposed JDWP Exploited in the Wild What Happens When Debug Ports Are Left Open
- 02 Jul Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
- 02 Jul Cl0p cybercrime gang's data exfiltration tool found vulnerable to RCE attacks
- 01 Jul Uncovering DPRK Remote Workers Detecting Hidden Threats Through Internet Telemetry
- 01 Jul Okta observes v0 AI tool used to build phishing sites
- 01 Jul Large Language Models (LLMs) Are Falling for Phishing Scams What Happens When AI Gives You the Wrong URL?
- 01 Jul Iran
- 01 Jul International Criminal Court hit with cyber attack during NATO summit
- 01 Jul Houken seeking a path by living on the edge with zero-days
- 01 Jul Crypto Operation Using Fake Investment Platforms Dismantled in Spain
- 01 Jul Critical Vulnerability in Microsens Devices Exposes Systems to Hackers
- 01 Jul Can You Trust that Verified Symbol? Exploiting IDE Extensions is Easier Than it Should Be
- 30 Jun Using AI to identify cybercrime masterminds
- 30 Jun Sinaloa drug cartel hired a cybersnoop to identify and kill FBI informants
- 30 Jun Jasper Sleet North Korean remote IT workers’ evolving tactics to infiltrate organizations
- 30 Jun 10 Things I Hate About Attribution RomCom vs. TransferLoader
- 27 Jun Tracing Blind Eagle to Proton66
- 27 Jun The People’s Liberation Army Cyberspace Force
- 27 Jun Stealthy WordPress Malware Drops Windows Trojan via PHP Backdoor
- 27 Jun NSFOCUS APT Monthly Briefing – May 2025
- 27 Jun Hawaiian Airlines Hit by Cybersecurity Incident
- 27 Jun Critical ICS vulnerabilities threaten Mitsubishi Electric and TrendMakers hardware across commercial facilities
- 26 Jun Zero-day Bluetooth gap turns millions of headphones into listening stations
- 26 Jun Taking the shine off BreachForums
- 26 Jun Supply Chain Incident Imperils Glasgow Council Services and Data
- 26 Jun Odyssey Stealer The Rebrand of Poseidon Stealer
- 26 Jun Gogs Remote Command Execution Vulnerability (CVE-2024-56731)
- 26 Jun GIFTEDCROOK’s Strategic Pivot From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations
- 26 Jun Extracting Lines of Interest From Zeek Logs
- 26 Jun DeepSeek Deception Sainbox RAT & Hidden Rootkit Delivery
- 26 Jun Decrement by one to rule them all AsIO3.sys driver exploitation
- 26 Jun Cisco ISE Vulnerability Allows Remote Attackers to Execute Malicious Commands
- 25 Jun The Case of Hidden Spam Pages
- 25 Jun Surge in MOVEit Transfer Scanning Could Signal Emerging Threat Activity
- 25 Jun Realtek Bluetooth Flaw Allows Attackers to Launch DoS Attacks During Pairing
- 25 Jun Patch and Persist Darktrace’s Detection of Blind Eagle (APT-C-36)
- 25 Jun Iranian Educated Manticore Targets Leading Tech Academics
- 25 Jun In the Wild Malware Prototype with Embedded Prompt Injection
- 25 Jun Cybercriminal abuse of large language models
- 25 Jun Cybercrime is surging across Africa
- 25 Jun Crash (exploit) and burn Securing the offensive cyber supply chain to counter China in cyberspace
- 25 Jun 2025-06-25 Daily Vulns
- 24 Jun Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI Agent
- 24 Jun Russia-linked APT28 use Signal chats to target Ukraine official with malware
- 24 Jun OneClik A ClickOnce-Based APT Campaign Targeting Energy, Oil and Gas Infrastructure
- 24 Jun Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack
- 24 Jun Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
- 24 Jun Cryptominers’ Anatomy Shutting Down Mining Botnets
- 24 Jun China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom
- 24 Jun Another Wave North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
- 24 Jun 2025-06-24 Daily Vulns
- 23 Jun Trix Shots Remote Code Execution on Aviatrix Controller
- 23 Jun SparkKitty, SparkCat’s little brother A new Trojan spy found in the App Store and Google Play
- 23 Jun Hive0154 aka Mustang Panda shifts focus on Tibetan community to deploy Pubload backdoor
- 23 Jun Critical Meshtastic Flaw Allows Attackers to Decrypt Private Messages
- 23 Jun ConnectUnwise Threat actors abuse ConnectWise as builder for signed malware
- 23 Jun Chinese “LapDogs” ORB Network Targets US and Asia
- 22 Jun Iran-Linked Threat Actors Leak Visitors and Athletes' Data from Saudi Games
- 22 Jun Androxgh0st Continues Exploitation Operators Compromise a US University For Hosting C2 Logger
- 21 Jun APT36 Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware
- 21 Jun 2025-06-21 Daily Vulns
- 20 Jun Zoom & doom BlueNoroff call opens the door
- 20 Jun Resurgence of the Prometei Botnet
- 20 Jun Aflac notifies SEC of breach suspected to be work of Scattered Spider
- 19 Jun Part 2 Tracking LummaC2 Infrastructure
- 19 Jun Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
- 19 Jun 2025-06-19 Daily Vulns
- 18 Jun What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia
- 18 Jun What’s Inside the Massive Chinese Data Leak
- 18 Jun Threat actor Banana Squad exploits GitHub repos in new campaign
- 18 Jun Same Sea, New Phish, Russian Government-Linked Social Engineering Targets App-Specific Passwords
- 18 Jun Ransomware Gangs Collapse as Qilin Seizes Control
- 18 Jun Fault Injection – Follow the White Rabbit
- 18 Jun Famous Chollima deploying Python version of GolangGhost RAT
- 18 Jun Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
- 17 Jun Smart air fryers ordered to stop invading our digital privacy
- 17 Jun Is b For Backdoor? Pre-Auth RCE Chain In Sitecore Experience Platform
- 17 Jun How Fraudsters Are Poisoning Search Results to Promote Phishing Sites
- 17 Jun Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet
- 17 Jun 2025-06-17 Daily Vulns
- 16 Jun Washington Post's email system hacked, journalists' accounts compromised
- 16 Jun VMOSX Data Leak Info of Thousands of Mac Cloud Users Potentially Exposed Online
- 16 Jun Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus
- 16 Jun Scattered Spider has moved from retail to insurance
- 16 Jun Report Links Los Pollos and RichAds to Malware Traffic Operations
- 16 Jun PyPI, npm, and AI Tools Exploited in Malware Surge Targeting DevOps and Cloud Environments
- 16 Jun Kali Linux 2025.2 released with 13 new tools, car hacking updates
- 16 Jun Is your AI safe? Threat analysis of MCP (Model Context Protocol)
- 16 Jun Fileless AsyncRAT Distributed Via Clickfix Technique Targeting German Speaking Users
- 16 Jun Clone, Compile, Compromise Water Curse’s Open-Source Malware Trap on GitHub
- 16 Jun CYFIRMA INDUSTRY REPORT – HEALTHCARE
- 16 Jun 2025-06-16 Daily Vulns
- 14 Jun 2025-06-14 Daily Vulns
- 13 Jun Paraguay is Being Targeted by Cybercriminals - 7.4 Million Citizen Records for Sale
- 13 Jun Anubis A Closer Look at an Emerging Ransomware with Built-in Wiper
- 13 Jun Acer Control Center Flaw Lets Attackers Run Malicious Code as Elevated User
- 13 Jun 2025-06-13 Daily Vulns
- 12 Jun Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
- 12 Jun The TokenBreak Attack
- 12 Jun Sweden says it is under cyber attack
- 12 Jun Ransomware scum disrupted utility services with SimpleHelp attacks
- 12 Jun Ransomware Scum Disrupted Utility Services with SimpleHelp Attacks
- 12 Jun New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches
- 12 Jun NAT and Packet Capture
- 12 Jun JSFireTruck Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique
- 12 Jun Inside a Dark Adtech Empire Fed by Fake CAPTCHAs
- 12 Jun Inside FluxPanel How Phishing Enables Real-Time Ecommerce Checkout Hijacks
- 12 Jun Graphite Caught, First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
- 12 Jun GitHub Device Code Phishing
- 12 Jun From Trust to Threat Hijacked Discord Invites Used for Multi-Stage Malware Delivery
- 12 Jun Fog Ransomware Unusual Toolset Used in Recent Attack
- 12 Jun EchoLeak Zero-Click AI Attack in Microsoft Copilot Exposes Company Data
- 12 Jun Don't Get Caught in the Headlights - DeerStealer Analysis
- 12 Jun 2025-06-12 Daily Vulns
- 11 Jun Toxic trend Another malware threat targets DeepSeek
- 11 Jun Researcher Finds Five Zero-Days and 20+ Misconfigurations in Salesforce Cloud
- 11 Jun Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited
- 11 Jun NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073
- 11 Jun Global analysis of Adversary-in-the-Middle phishing threats
- 11 Jun Attackers Unleash TeamFiltration Account Takeover Campaign (UNK_SneakyStrike) Leverages Popular Pentesting Tool
- 11 Jun APT PROFILE – MISSION2025
- 11 Jun 2025-06-11 Daily Vulns
- 10 Jun Unmasking the Infrastructure of a Spearphishing Campaign
- 10 Jun The Evolution of Linux Binaries in Targeted Cloud Operations
- 10 Jun Telegram Messenger's Ties to Russia's FSB Revealed in New Report
- 10 Jun Security Flaws in eMagicOne Store Manager for WooCommerce in WordPress (CVE-2025-5058 and CVE-2025-4603)
- 10 Jun Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account
- 10 Jun Peep show 40K IoT cameras worldwide stream secrets to anyone with a browser
- 10 Jun Flask Phishing Kit Targeted Credential Theft Using Open-Source Technology
- 10 Jun Critical Vulnerability Patched in SAP NetWeaver
- 10 Jun Coordinated Brute Force Activity Targeting Apache Tomcat Manager Indicates Possible Upcoming Threats
- 10 Jun CVE-2025-33053, Stealth Falcon and Horus A Saga of Middle Eastern Cyber Espionage
- 10 Jun A vulnerability in Insyde H2O UEFI application allows for digital certificate injection via NVRAM variable
- 09 Jun iMessage Zero-Click Attacks Suspected in Targeting of High-Value Individuals
- 09 Jun Two Botnets, One Flaw Mirai Spreads Through Wazuh Vulnerability
- 09 Jun Sleep with one eye open how Librarian Ghouls steal data by night
- 09 Jun PayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites
- 09 Jun Grocery wholesale giant United Natural Foods hit by cyberattack
- 09 Jun GhostVendors Exposed Silent Push Uncovers Massive Network of 4000+ Fraudulent Domains Masquerading as Major Brands
- 09 Jun Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
- 09 Jun Eggs in a Cloudy Basket Skeleton Spider’s Trusted Cloud Malware Delivery
- 09 Jun DanaBleed DanaBot C2 Server Memory Leak Bug
- 09 Jun Analysis of the Triple Combo Threat of the Kimsuky Group
- 09 Jun APT 41 Threat Intelligence Report and Malware Analysis
- 07 Jun 2025-06-07 Daily Vulns
- 06 Jun The FBI Issued a Warning About This Malware That's Infecting Millions of Devices
- 06 Jun Operation DRAGONCLONE Chinese Telecommunication industry targeted via VELETRIX & VShell malware
- 06 Jun Mapping Hidden Alliances in Russian-Affiliated Ransomware
- 06 Jun Blitz Malware A Tale of Game Cheats and Code Repositories
- 06 Jun Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721
- 06 Jun 2025-06-06 Daily Vulns
- 05 Jun What Really Happened in the Aftermath of the Lizard Squad Hacks
- 05 Jun Unmasking Insecure HTTP Data Leaks in Popular Chrome Extensions
- 05 Jun Proxy Services Feast on Ukraine’s IP Address Exodus
- 05 Jun Operation Endgame Disrupts AvCheck, Forces Threat Actors to Seek Alternatives
- 05 Jun Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
- 05 Jun ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware
- 05 Jun Chinese Hackers Infiltrated U.S. Telecom Networks a Year Earlier Than Previously Known
- 05 Jun BladedFeline Whispering in the dark
- 05 Jun Android Spyware Alert! Fake government app targeting Android users in India!
- 05 Jun Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure
- 05 Jun 2025-06-05 Daily Vulns
- 04 Jun The strange tale of ischhfd83 When cybercriminals eat their own
- 04 Jun The Cost of a Call From Voice Phishing to Data Extortion
- 04 Jun The Bitter End Unraveling Eight Years of Espionage Antics—Part One
- 04 Jun StormWall Reveals India, China and US Faced Most DDoS Attacks in Q1 2025
- 04 Jun Same Automated Impersonation for All
- 04 Jun Roundcube Webmail under fire critical exploit found after a decade
- 04 Jun Multiple CVEs in Infoblox NetMRI RCE, Auth Bypass, SQLi, and File Read Vulnerabilities
- 04 Jun Global Conflicts in the Digital Age – How Geopolitics Influence Cyber Operations
- 04 Jun From open-source to open threat Tracking Chaos RAT’s evolution
- 04 Jun Fake WordPress Caching Plugin Used to Steal Admin Credentials
- 04 Jun Criminals Bribed Outsourced Contractors to Steal Coinbase User Data
- 04 Jun Android malware trends Stealthier, easier-to-use
- 03 Jun The Rising Tide Understanding the Surge in Cyber Attacks in India
- 03 Jun The Hidden Cost of Trust New Data Reveals Alarming Employee Engagement with Vendor Email Compromise
- 03 Jun Illicit crypto-miners pouncing on lazy DevOps configs that leave clouds vulnerable
- 03 Jun How Threat Actors Exploit Human Trust A Breakdown of the 'Prove You Are Human' Malware Scheme
- 03 Jun Crocodilus Mobile Malware Evolving Fast, Going Global
- 02 Jun Victims risk AsyncRAT infection after being redirected to fake Booking.com sites
- 02 Jun Versa Concerto Understanding and Mitigating CVE-2025-34027
- 02 Jun US community bank says thieves drained customer data through third party hole
- 02 Jun Qualcomm fixes three Adreno GPU zero-days exploited in attacks
- 02 Jun New Linux Vulnerabilities Expose Password Hashes via Core Dumps
- 02 Jun Malicious Ruby Gems Exfiltrate Telegram Tokens and Messages Following Vietnam Ban
- 02 Jun Incorrect permission assignment on Universal Forwarder for Windows during new installation or upgrade
- 02 Jun Hackers Weaponize Free SSH Client PuTTY to Deliver Malware on Windows
- 02 Jun Backdoors in Python and NPM Packages Target Windows and Linux
- 02 Jun Alleged Conti, TrickBot Gang Leader Unmasked
- 02 Jun Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
- 01 Jun mommy Access Broker
- 30 May XSSing TypeErrors in Safari
- 30 May Interlock ransomware what you need to know
- 30 May Exploits and vulnerabilities in Q1 2025
- 29 May When Samsung's Magic Turns Tragic A Tale of Unauthorized Mining
- 29 May Tracking LummaC2 Infrastructure with Cats
- 29 May Threat Hunting C2 over HTTPS Connections Using the TLS Certificate
- 29 May Surveillance Via Smart Toothbrush
- 29 May Russian-linked hackers target UK Defense Ministry while posing as journalists
- 29 May Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations
- 29 May Monkey-Patched PyPI Packages Use Transitive Dependencies to Steal Solana Private Keys
- 29 May Haozi’s Plug-and-Play Phishing-as-a-Service Has Facilitated $280,000 of Criminal Transactions Over Past Five Months
- 29 May Emulating the Unyielding Scattered Spider
- 29 May Deep Dive into a Dumped Malware without a PE Header
- 29 May Cybercriminals camouflaging threats as AI tool installers
- 28 May Zanubis in motion Tracing the active evolution of the Android banking malware
- 28 May Restless Guests The True Entra B2B Guest Threat Model
- 28 May Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict
- 28 May NHS trusts' data 'stolen' in cyberattack
- 28 May Mark Your Calendar APT41 Innovative Tactics
- 27 May The Sharp Taste of Mimo’lette Analyzing Mimo’s Latest Campaign targeting Craft CMS
- 27 May Text-to-Malware How Cybercriminals Weaponize Fake AI-Themed Websites
- 27 May New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
- 27 May Malware or LLM? Silent Werewolf employs new loaders to attack Russian and Moldovan organizations
- 27 May MATLAB dev confirms ransomware attack behind service outage
- 27 May Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers
- 27 May Earth Lamia Develops Custom Arsenal to Target Multiple Industries
- 27 May DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
- 27 May Crypto & Investment scams exploiting the Tesla brand
- 27 May Coordinated Cloud-Based Scanning Operation Targets 75 Known Exposure Points in One Day
- 27 May AIVD and MIVD identify new Russian cyber threat actor
- 26 May SilverRAT Source Code Leaked Online Here’s What You Need to Know
- 26 May Reborn in Rust AsyncRAT
- 26 May Eye of the Storm Dissecting the Playbook of Cyber Toufan
- 23 May Operation Sindoor – Anatomy of a Digital Siege
- 23 May Bypassing MTE with CVE-2025-0072