Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams More... Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets More... The Hidden Weaknesses in AI SOC Tools that No One Talks About More... Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms More... Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials More... North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign More... That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat More... Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns More... U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware More... Vercel's v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale More... Critical Vulnerability in Anthropic's MCP Exposes Developer Machines to Remote Exploits More... TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns More... New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status More... A New Maturity Model for Browser Security: Closing the Last-Mile Risk More... Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update More... U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farms More... Microsoft Removes Password Management from Authenticator App Starting August 2025 More... U.S. Agencies Warn of Rising Iranian Cyber Attacks on Defense, OT Networks, and Critical Infrastructure More... Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects More... Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks More... Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories More... ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more More... FBI Warns of Scattered Spider's Expanding Attacks on Airlines Using Social Engineering More... GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool More... Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns More... Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign More... PUBLOAD and Pubshell Malware Used in Mustang Panda's Tibet-Specific Attack More... Business Case for Agentic AI SOC Analysts More... Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit More... MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted More... OneClik Red Team Campaign Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors More... Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks More... Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access More... New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks More... The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience More... Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks More... Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa More... CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet More... WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews More... nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery More... Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC More... Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure More... Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games More... Beware the Hidden Risk in Your Entra Environment More... SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks More... North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages More... Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options More... New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public More... Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue More... Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers More... |