top of page
Topics
Search


Google's 2024 Zero-Day Report: A Shift Towards Enterprise Vulnerabilities
In its annual report, Google has revealed a notable trend in zero-day vulnerabilities for 2024, identifying 75 exploits in the wild, a...
2


CISA Warns of Active Exploitation: New Vulnerabilities Added to KEV Database
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added two critical vulnerabilities affecting Broadcom's...
2


Earth Kurma APT Campaign: A New Threat to Southeast Asia's Cybersecurity
A new advanced persistent threat (APT) group, dubbed Earth Kurma, has emerged, targeting government and telecommunications sectors across...
22


Beware: WooCommerce Users Under Siege by Phishing Campaign Disguised as Security Patches
Cybersecurity experts have raised alarms over a sophisticated phishing campaign targeting WooCommerce users. The attackers are sending...
18


Lazarus Group Strikes Again: Six South Korean Companies Hit by Sophisticated Malware Attacks
At least six South Korean companies have fallen victim to a series of malware attacks orchestrated by the notorious Lazarus Group, linked...
61


Critical SAP NetWeaver Vulnerability Exposed: Hackers Suspected of Zero-Day Exploitation
SAP has confirmed a critical vulnerability in its NetWeaver platform, raising alarms as cybersecurity experts suspect that hackers are...
9


Understanding the Most Frequently Encountered Malware and Abused Software: Insights from the Sophos 2025 Threat Report
As the cybersecurity landscape evolves, attackers are no longer just deploying ransomware. They’re exploiting legitimate tools, stealing...
82


WhatsApp Unveils Advanced Chat Privacy Features to Enhance User Security
In a significant move to bolster user privacy, WhatsApp has introduced its new Advanced Chat Privacy feature. This update aims to prevent...
6


Darcula Unleashes GenAI-Powered Phishing Toolkit, Empowering Cybercriminals
The notorious Darcula phishing-as-a-service (PhaaS) platform has recently integrated generative artificial intelligence (GenAI)...
10


Iranian Hackers Deploy MURKYTOUR Malware Through Deceptive Job Campaign Targeting Israel
In a sophisticated cyber espionage operation, Iranian hackers have been identified using a fake job recruitment campaign to deploy a...
49


Google Strengthens Chrome's Incognito Mode with New IP Protection Feature
Google has announced significant enhancements to its Chrome browser, particularly focusing on its Incognito mode. The tech giant will...
14


Emerging SuperCard X Malware Threatens Financial Security with NFC Relay Attacks
A new Android malware known as SuperCard X has surfaced, posing a significant threat to financial security by enabling contactless ATM...
5


Phishing Alert: Cybercriminals Exploit Google Infrastructure to Steal Credentials
In a recent alarming development, cybercriminals have devised a sophisticated phishing attack that exploits Google’s infrastructure to...
97


Proton66 Hosting Under Siege: Global Cyber Attacks Unleashed by Hackers
Cybersecurity experts have raised alarms over a significant increase in cyber attacks linked to Proton66, a Russian bulletproof hosting...
72


Emerging Threat: New XorDDoS Controller Targets Docker and IoT Devices
Cybersecurity experts have identified a new variant of the XorDDoS malware, which is increasingly targeting Docker and Internet of Things...
11


State-Sponsored Hackers Utilize ClickFix Technique for Sophisticated Malware Attacks
Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have recently adopted the ClickFix social engineering tactic...
51


SonicWall SMA Devices Under Attack: CISA Warns of Critical Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a critical vulnerability in SonicWall's...
14


Google Takes Major Action Against Ad Fraud: 5.1 Billion Ads Blocked and 39.2 Million Accounts Suspended in 2024
In a significant move to enhance online safety, Google announced that it blocked 5.1 billion harmful ads and suspended 39.2 million...
8


4chan Hacked: Major Data Breach Shuts Down Infamous Forum
In a shocking turn of events, the notorious online forum 4chan has been taken offline following a significant hack that exposed sensitive...
95


Crypto Developers Under Siege: Python Malware Masquerades as Coding Challenges
In a disturbing trend, cryptocurrency developers are being targeted by a North Korean hacking group known as Slow Pisces, which is...
18


ResolverRAT: The New Cyber Threat Targeting Healthcare and Pharma
Cybersecurity experts have identified a new remote access trojan (RAT) named ResolverRAT, which is specifically targeting the healthcare...
10


Browser Extensions: A Hidden Threat to Enterprise Data Security
A recent report has revealed alarming findings regarding browser extensions, highlighting their potential to access sensitive enterprise...
15


Microsoft Unveils Revolutionary State of Matter for Quantum Computing
Microsoft has announced a groundbreaking development in quantum computing, claiming to have created a new state of matter that could...
3


Understanding The Cloud Operating Model: Key Insights For Organizations
The cloud operating model has been a hot topic for nearly two decades, yet many organizations still struggle to grasp its full meaning....
6
bottom of page