News

Phishers abused Google Sites and DKIM replay to send valid-signed emails, bypassing filters and stealing credentials.
Security teams must integrate browser security into their enterprise security stack to gain real-time visibility, detect ...
Microsoft secures MSA and Entra ID with Azure Confidential VMs + HSM, preventing token forgery and reducing breach risks.
"In some systems, initial access was gained through exploiting the RDP vulnerability (BlueKeep, CVE-2019-0708)," the South ...
Lotus Panda breached 6 Southeast Asian organizations using custom tools, browser stealers, and sideloaded malware.
SuperCard X malware exploits NFC relay and social engineering to steal card data in Italy, enabling ATM fraud.
From zero-click iOS exploits to NTLM credential leaks and the 4Chan breach — this week’s cyber threats hit where trust runs ...
The surge in DDoS attack traffic this year has been driven in part by the rapid expansion of IoT devices - from smart watches ...
Proton66-hosted IPs launched global cyberattacks since Jan 8, 2025, exploiting critical CVEs to deploy malware.
The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting ...
Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram ...
ASUS has disclosed a critical security flaw impacting routers with AiCloud enabled that could permit remote attackers to ...