Cybersecurity News

Threat Actors Trojanize Popular Versions of Games To In...

In a sophisticated cyberattack campaign dubbed “StaryDobry,” threat actors have ...

CISA Warns of SonicWall SonicOS RCE Vulnerability Activ...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has escalated w...

Vgod RANSOMWARE Encrypt Your Entire System and Set A Ra...

A new ransomware strain dubbed Vgod has emerged recently as a critical cybersecu...

ChatGPT Operator Prompt Injection Exploit Leaking Priva...

OpenAI’s ChatGPT Operator, a cutting-edge research preview tool designed for Cha...

Beware of Fake Timesheet Report Email Leading to the Ty...

A new wave of phishing attacks is exploiting fake timesheet report emails to lur...

Ransomware Gangs Encrypt Systems After 17hrs From Initi...

New research reveals ransomware gangs are accelerating encryption timelines whil...

RansomHub Evolves To Attack Windows, ESXi, Linux and Fr...

The RansomHub ransomware group has rapidly emerged as one of the most prolific c...

CISA Warns of Apple iOS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an u...

Xerox Printers Vulnerability Let Attackers Capture Auth...

Multiple vulnerabilities in enterprise-grade Xerox Versalink C7025 multifunction...

Hidden Malware in WordPress Websites Allows Attackers t...

A sophisticated malware campaign has recently been uncovered by security researc...

New XCSSET Malware Attacking macOS Users by Infecting X...

Microsoft Threat Intelligence has identified an evolved iteration of the XCSSET ...

IDOR Vulnerability in ExHub Let Attacker Modify Web Hos...

A critical Insecure Direct Object Reference (IDOR) vulnerability was recently di...

Multiple Russian Actors Attacking Orgs To Hack Microsof...

Security researchers at Volexity have uncovered multiple Russian threat actors c...

Indian Post Office Portal Exposed Thousands of KYC Reco...

The Indian Post Office portal was found vulnerable to an Insecure Direct Object ...

New Android Security Feature that Blocks Changing Sensi...

Google has unveiled a groundbreaking security feature in Android 16 Beta 2 aimed...

Beware of Fake Outlook Troubleshooting Calls that Ends ...

A sophisticated cyber threat has emerged in recent weeks, targeting unsuspecting...

PurpleLab – A Free Cybersecurity Lab for Security Teams...

In a significant step forward for cybersecurity professionals, PurpleLab offers ...

Meta Paid Out $2.3 Million to Researchers via Bug Bount...

In 2024, Meta, the parent company of Facebook, Instagram, and WhatsApp, continue...

Threat Actors Leveraging Modified Version of SharpHide ...

Threat actors have been utilizing a modified version of the SharpHide tool to cr...

Hackers Abusing Microsoft Teams Meeting Invites to Tric...

In a sophisticated cyberattack campaign, a threat actor identified as Storm-2372...

Google Chrome AI-Powered Security Now Available for All...

In a significant update, Google has announced that its AI-powered security featu...

Linux Kernel 6.14 rc3 Released – What’s New!

Linus Torvalds has released Linux Kernel 6.14-rc3, the latest release candidate ...

Cybersecurity Weekly Recap: Latest on Attacks, Vulnerab...

Welcome to this week’s Cybersecurity Newsletter, where we bring you the latest u...

New Go-Based Malware Exploits Telegram and Use It as C2...

Researchers have identified a new backdoor malware, written in Go programming la...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.