Palo Alto Networks’ Unit 42 and ESET describe MuddyWater, an Iran-linked cyber e...
Akira ransomware exploits year-old SonicWall CVE-2024-40766 vulnerability in agg...
India's new Telecommunication Cybersecurity Amendment Rules 2025 mandate active ...
Newly discovered Android MaaS (Malware-as-a-Service) tools, Albiriox and RadzaRa...
2025 marks the dawn of AI-weaponized ransomware with attacks surging 34%, featur...
CISA added the OpenPLC ScadaBR XSS bug (CVE-2021-26829) to its KEV catalog due t...
Mercedes-Benz USA allegedly breached: 18.3 GB of litigation strategies and custo...
Public GitLab repos exposed 17,000+ secrets across 2,800 domains, leaking API ke...
A phishing attack uses the deceptive domain “rnicrosoft.com” (replacing 'm' with...
Legacy Python bootstrap scripts in PyPI packages like Tornado expose supply chai...
North Korean threat actors have launched a large-scale supply-chain attack by pu...
Chrome extension scam alert: Crypto Copilot steals Solana by injecting hidden fe...
Microsoft is preparing a major update for Entra ID in 2026 that introduces a str...
AI-driven cyberattacks will dominate by 2026, overwhelming legacy SOCs with evas...
FBI warns of $262M in account takeover fraud losses. Learn how cybercriminals us...
Researchers at watchTowr Labs uncovered that online code tools JSONFormatter and...