News
Popular password manager plugins for web browsers have been found susceptible to clickjacking security vulnerabilities that ...
Organizations detected only 1 in 7 attacks in 2025; log failures, misconfigurations, and performance issues left systems ...
Traditional tools fail; Keeper CEO highlights zero trust, least privilege, and AI automation reshaping defense.
Transparent Tribe targets Indian government using weaponized .desktop files since 2022, enabling persistence and credential ...
ShinyHunters is a notorious cybercrime group that has resurfaced with a new playbook of SaaS-focused attacks. Known for ...
The details are transmitted to a threat actor-controlled Telegram bot named "@sshZXC_bot" (ssh_bot) via the API, which then ...
Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose ...
Phishing emails with RAR archives exploit Linux filename injection to deliver VShell backdoor, bypassing antivirus defenses ...
INTERPOL’s Operation Serengeti 2.0 Arrests 1,209 Cybercriminals in Africa, Recovers $97.4M, Dismantles 11,432 Infrastructures ...
Murky Panda exploited Citrix CVE-2023-3519 and Commvault CVE-2025-3928 to deploy CloudedHope malware, enabling covert ...
Automated pentest delivery replaces static PDFs with real-time workflows, cutting remediation delays and reducing MTTR.
"The 'kill switch' code – which Lu named 'IsDLEnabledinAD,' abbreviating 'Is Davis Lu enabled in Active Directory' — was ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results