Cybersecurity News

Countermeasures Against State-Sponsored APT Operations ...

State-sponsored Advanced Persistent Threats (APTs) have become the defining chal...

New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Acc...

A sophisticated botnet campaign dubbed “AyySSHush” has compromised over 9,000 AS...

Microsoft OneDrive File Picker Vulnerability Exposes Us...

A critical security flaw in Microsoft’s OneDrive File Picker has exposed million...

ChoiceJacking Attack Let Hackers Compromise Android & i...

Cybersecurity researchers have uncovered a sophisticated new attack method calle...

Building a Cyber-Resilient Organization in 2025

As 2025 unfolds, the digital battleground has never been more complex-or more co...

3 SOC Metrics Improved With Sandbox Analysis 

SOC teams are flooded with alerts, but what really matters is how quickly they c...

The Future of Cybersecurity – Trends Shaping the Industry

As digital transformation accelerates across industries, the cybersecurity lands...

XenServer VM Tools for Windows Vulnerability Let Attack...

Three critical vulnerabilities in XenServer VM Tools for Windows allow attackers...

251 Malicious IPs Attacking Cloud-Based Devices Leverag...

A highly coordinated reconnaissance campaign that deployed 251 malicious IP addr...

Threat Actors Impersonate Fake Docusign Notifications T...

Cybercriminals have increasingly targeted Docusign, the popular electronic signa...

Incident Response Planning – Preparing for Data Breaches

As the digital threat landscape intensifies and new technologies reshape busines...

93+ Billion Stolen Users’ Cookies Flooded by Hackers on...

Security researchers have uncovered a significant cybercrime operation involving...

WordPress TI WooCommerce Wishlist Plugin Vulnerability ...

A critical security vulnerability in the popular TI WooCommerce Wishlist plugin ...

Hackers Exploit SimpleHelp RMM Tool to Deploy DragonFor...

Cybercriminals leveraged critical vulnerabilities in remote monitoring software ...

Zscaler Expands AI-Driven Security Operations with Red ...

Zscaler Inc. announced on May 27, 2025, a definitive agreement to acquire Red Ca...

PoC Published For Fortinet 0-Day Vulnerability That Bei...

Security researchers have published detailed proof-of-concept (PoC) analysis for...

CefSharp Enumeration Tool Reveals Security Vulnerabilit...

Security researchers have unveiled significant vulnerabilities in .NET desktop a...

Gujarat Teen Behind 50+ Cyberattacks During ‘Operation ...

The Gujarat Anti-Terrorism Squad (ATS) has arrested an 18-year-old and a minor f...

Russian Hackers Leverage Oracle Cloud Infrastructure to...

In a sophisticated cybersecurity attack uncovered this week, Russian threat acto...

Halo Security Achieves SOC 2 Type 1 Compliance, Validat...

Halo Security, a leading provider of attack surface management and penetration t...

Netwrix Password Manager Vulnerability Allows Authentic...

A critical security vulnerability has been discovered in Netwrix Password Secure...

Cisco Webex Meetings Vulnerability Let Attackers Manipu...

Cisco disclosed a security vulnerability (CVE-2025-20255) affecting its Webex Me...

UAT-638 Hackers Exploit Cityworks Zero-Day to Attack II...

A sophisticated cyber threat group designated as UAT-6382 has been actively expl...

INE Security Partners with Abadnet Institute for Cybers...

INE Security, a global leader in Cybersecurity training and certifications, has ...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.