Cybersecurity News

Rooted (Jailbroken) Mobile Devices 3.5 Times More Vulne...

A recent study has revealed that rooted devices are over 3.5 times more likely t...

Hackers Exploiting Multiple Cisco Smart Licensing Utili...

Researchers have detected active exploitation attempts targeting two critical vu...

IBM AIX Vulnerability Let Attackers Execute Arbitrary C...

Critical security vulnerabilities in IBM AIX operating systems could allow unaut...

New Steganographic Malware Exploits JPEG Files to Distr...

A sophisticated malware campaign employing steganographic techniques has recentl...

RansomHub Affiliate Deploying New Custom Backdoor Dubbe...

A RansomHub affiliate has been observed recently deploying a new custom backdoor...

Microsoft Attributes Recent Outage of Outlook Web to Co...

Microsoft experienced a widespread outage on March 19, 2025, affecting Outlook o...

How Threat Hunters Enrich Indicators With Context 

While data is king, context is his queen — together, they reign over domains tha...

North Korean IT Workers Exploiting GitHub to Attack Org...

A sophisticated network of suspected North Korean IT workers has been discovered...

Multiple Dell Secure Connect Gateway Flaws Allows Syste...

Dell Technologies has issued a critical security advisory warning customers abou...

Babuk2 Ransomware Issuing Fake Extortion Demands With D...

The Babuk2 ransomware group has been caught issuing extortion demands based on f...

Paragon Spyware Exploited WhatsApp Zero-day Vulnerabili...

Researchers have uncovered extensive evidence linking Israeli firm Paragon Solut...

Zero-Hour Phishing Attacks Exploiting Browser Vulnerabi...

Recent cybersecurity data reveals an alarming 130% surge in zero-hour phishing a...

CISA Warns of SAP NetWeaver Directory Traversal Vulnera...

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical...

Linux Kernel Out-of-bounds Write Vulnerability Let Atta...

A severe vulnerability in the Linux kernel has remained undetected for nearly tw...

Kali Linux 2025.1a Released With New Tool & Updates to ...

 Kali Linux, the widely acclaimed cybersecurity-focused distribution, has offici...

Kali Linux 2025.1a New Tool & Upates to Desktop Environ...

 Kali Linux, the widely acclaimed cybersecurity-focused distribution, has offici...

SecPod launches Saner Cloud: A Revolutionary CNAPP For ...

Moving Beyond Detection to Real-Time, Automated Security Across Workloads, Cloud...

Hackers Leveraging RMM Tools To Maintain Persistence To...

Cybersecurity experts have identified a persistent trend of threat actors exploi...

ANY.RUN’s New Android OS Support Let SOC/DFIR Team Perf...

ANY.RUN, the interactive malware analysis platform has announced full support fo...

Threat Actors Exploiting Legacy Drivers to Bypass TLS C...

A sophisticated attack employing Legacy Driver Exploitation technique has emerge...

US Sperm Donor Giant California Cryobank Hacked – Custo...

California Cryobank LLC, one of America’s largest sperm donor repositories, has ...

41% of Success Logins Across Websites Involves Compromi...

Password reuse continues to be one of the most significant security vulnerabilit...

Attackers Embedding Malicious Word file into a PDF to E...

A sophisticated attack vector dubbed “MalDoc in PDF” allows threat actors to byp...

Beware of Fake GitHub “Security Alerts” Let Hackers Hij...

A widespread phishing campaign is currently targeting GitHub repositories with f...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.