Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws
SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version
Reevaluating SSEs: A Technical Gap Analysis of Last-Mile Protection
Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times
NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware
Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet
New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims
Third Parties and Machine Credentials: The Silent Drivers Behind 2025's Worst Breaches
Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks
Entra ID Data Protection: Essential or Overkill
Update ASAP: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers
Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence
Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi
Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed
Weekly Recap: Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors
Perfection is a Myth. Leverage Isn't: How Small Teams Can Secure Their Google Workspace
Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data
Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware
U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems
TikTok Slammed With '530 Million GDPR Fine for Sending E.U. Data to China
How to Automate CVE and Vulnerability Advisory Response with Tines
MintsLoader Drops GhostWeaver via Phishing, ClickFix ' Uses DGA, TLS for Stealth Attacks
Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support
Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers
Why top SOC teams are shifting to Network Detection and Response
Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign
New Research Reveals: 95% of AppSec Fixes Don't Reduce Risk
DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics
Commvault Confirms Hackers Exploited CVE-2025-3928 as Zero-Day in Azure Breach
SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models
How southerners shortchange Northern Christians - Punch