Cybersecurity News

50 World’s Best Penetration Testing Companies – 2025

Penetration testing, or “pentesting,” is a cybersecurity practice where ethical ...

BlackBastaGPT – A ChatGPT Powered Tool to Uncover Ranso...

A new AI-powered chatbot, BlackBastaGPT, trained on over 1 million leaked intern...

Salt Typhoon Hackers Exploit Cisco Vulnerability To Gai...

Cisco Talos has uncovered a sophisticated cyberespionage campaign by the state-a...

Auto-Generated Password Vulnerability In Sitevision Lea...

A critical security flaw in Sitevision CMS versions 10.3.1 and older has exposed...

China Claim That NSA Allegedly Hacked Northwestern Poly...

Chinese cybersecurity authorities have alleged that the U.S. National Security A...

ACRStealer Malware Exploiting Google Docs as C2 To Stea...

A newly identified malware variant dubbed ACRStealer has been observed leveragin...

Darcula 3.0 Tool Automatically Generates Phishing Kit F...

The darcula phishing group has escalated cybercrime capabilities with its newly ...

Pegasus Spyware Used Widely to Target Individuals in Pr...

Pegasus spyware, once considered a tool for targeting journalists and activists—...

SPAWNCHIMERA Malware Exploiting Ivanti Buffer Overflow ...

Ivanti disclosed a critical buffer overflow vulnerability (CVE-2025-0282) affect...

Chinese Hackers Using New Bookworm Malware In Attacks T...

Security researchers at Palo Alto Networks’ Unit 42 have uncovered a resurgence ...

New Active Directory Pentesting Tool to Validate KeyCre...

RedTeamPentesting has unveiled a new tool, keycred, which offers a robust soluti...

Google Released PoC Exploit For Palo Alto Firewall Comm...

Google’s Project Zero and Mandiant cybersecurity teams have jointly published a ...

New Active Directory Pentesting Tool For KeyCredentialL...

RedTeamPentesting has unveiled a new tool, keycred, which offers a robust soluti...

Windows Wi-Fi Password Stealer Malware Found Hosted on ...

A GitHub repository titled Windows-WiFi-Password-Stealer has surfaced, raising c...

Ivanti Endpoint Manager Vulnerabilities Proof-of-Concep...

A cluster of four critical vulnerabilities in Ivanti Endpoint Manager (EPM) has ...

New NailaoLocker Ransomware Attacking European Healthcare

European healthcare organizations are facing a sophisticated cyber threat from a...

Beware of North Korean Job Interview Process Delivers M...

A new malware campaign attributed to North Korean threat actors has been identif...

Chinese Hackers Exploiting Check Point Firewall Vulnera...

A sophisticated cyber espionage campaign linked to Chinese state-aligned threat ...

Free SOC Webinar – Better SOC with Interactive Malware ...

If you work in a Security Operations Center (SOC), you know the struggle all too...

Rhadamanthys Infostealer Exploiting Microsoft Managemen...

Researchers uncovered an ongoing campaign distributing the Rhadamanthys Infostea...

IBM OpenPages Vulnerability Let Attackers Steal Authent...

IBM has addressed multiple high-severity vulnerabilities in its OpenPages Govern...

Sophisticated Phishing Attacks Targeting Decision-Maker...

A recent study by cybersecurity firm Hackmosphere reveals alarming gaps in phish...

South Korea Confirm DeepSeek Sending Data Chinese ByteD...

South Korea’s Personal Information Protection Commission (PIPC) announced today ...

Raymond IT Systems Hit by Cyber Attack – Investigation ...

Raymond Limited, a textile and clothing company, reported a cybersecurity attack...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.