Cybersecurity News

Threat Actors Leveraging AES Cryptography For Payload P...

Several sophisticated multi-stage malware campaigns were revealed by recent find...

BigAnt Server 0-day Vulnerability Let Attackers Execute...

A critical zero-day vulnerability in BigAntSoft’s BigAnt Server (CVE-2025-0364) ...

IBM Storage Virtualize Vulnerabilities Let Attackers Ex...

IBM has issued urgent security advisories for two high-severity vulnerabilities ...

Google, Meta and Apple Fuel the World’s Largest Surveil...

The exponential growth of government data requests to technology giants has tran...

Hackers Attacking 4000+ ISPs With New Malware for Remot...

Researchers from Splunk have identified a sophisticated malware campaign targeti...

Docusnap for Windows Vulnerability Let Attackers Access...

A critical information disclosure vulnerability in Docusnap, a widely used IT in...

New Android RAT Dubbed “AndroRAT” Attacking to Steal Pa...

A newly identified variant of the Android Remote Access Tool (RAT), AndroRAT, ha...

VMware ESXi Vulnerabilities Exploited in Wild to Execut...

VMware has issued a critical security advisory (VMSA-2025-0004) warning of activ...

CISA Warns of Windows Win32k Vulnerability Exploited to...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an adviso...

Google Warns of Two Critical Android Vulnerabilities Un...

Google has issued an urgent security alert for CVE-2024-43093 and CVE-2024-50302...

Google’s New Email Shield Feature Let Users Hide Email ...

Google is advancing its email privacy arsenal with the development of Shielded E...

Hackers Using ClickFix Tactic to Attack Windows Machine...

A sophisticated phishing campaign in which threat actors are utilizing a multi-s...

North Korean IT Workers Using Astrill VPN To Hide Their...

Cybersecurity firm Silent Push have confirmed recently that North Korean IT work...

HiveOS Vulnerabilities Let Attackers Execute Arbitrary ...

Security researchers have uncovered three critical vulnerabilities in Extreme Ne...

Attackers Automating Vulnerability Exploits with Few Ho...

The cybersecurity landscape of 2024 witnessed an unprecedented increase in mass ...

U.S. Halts Cyber Operations Targeting Russia

The United States has paused offensive cyber operations against Russia under an ...

JavaGhost Leveraging Amazon IAM Permissions To Trigger ...

Unit 42, the threat intelligence team at Palo Alto Networks, has identified a so...

Apache Derby Vulnerability Let Attackers Bypass Authent...

A critical security vulnerability (CVE-2022-46337) in Apache Derby, an open-sour...

MediaTek Warns of Multiple Vulnerabilities that let Att...

MediaTek has issued urgent security advisories warning of multiple high-severity...

New Vulnerability in Substack let Attackers Take Over S...

A newly disclosed edge case in Substack’s custom domain implementation allows th...

US Army Soldier Arrested for Hacking 15 Telecom Carriers

U.S. Army Specialist Cameron John Wagenius, 21, is charged with federal offenses...

35,000+ Websites Hacked To Inject Malicious Scripts Red...

A massive cybersecurity breach has compromised over 35,000 websites, injecting m...

Top 10 Best Dynamic Malware Analysis Tools in 2025

Dynamic malware analysis tools are critical for detecting and understanding mode...

Google’s SafetyCore App Secretly Scans All Your Photos ...

A recent surge in user reports has revealed that Google’s Android System SafetyC...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.