Silk Typhoon exploits zero-day vulnerabilities, stolen API keys, and cloud services to infiltrate IT supply chains and ...
USB attacks exploit common devices to spread malware. Wazuh detects threats like Stuxnet and Raspberry Robin across OS ...
Lotus Panda targets Asian government and media sectors with new Sagerunex backdoor variants using Dropbox, X, and Zimbra for ...
Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android device ...
Why is Identity the new prime target? The 2024 Verizon Data Breach Report found that 80% of breaches involve compromised ...
Dark Caracal APT deploys Poco RAT malware in Latin America, targeting enterprises via phishing lures. Attackers use .REV ...
Attackers are using typosquatted Go packages to deploy malware on Linux and macOS, targeting financial developers.
Broadcom patches three actively exploited VMware flaws, including a critical (CVSS 9.3) bug enabling code execution. Update ...
CISA adds five exploited vulnerabilities to its KEV catalog, including flaws in Cisco, Microsoft, and Progress software.
Hackers used a compromised Indian electronics firm’s email to deliver a Golang backdoor in a UAE-targeted phishing campaign.
Google has released its monthly Android Security Bulletin for March 2025 to address a total of 44 vulnerabilities, including ...
Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) ...