Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile…
Data Breach
-
-
Oct 07, 2025Ravie LakshmananVulnerability / Cloud Security Redis has disclosed details of a maximum-severity…
-
Data BreachSecurity
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
by adminby adminOct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of research, academics…
-
Data BreachSecurity
Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
by adminby adminOct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group…
-
Data BreachSecurity
New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT
by adminby adminOct 03, 2025Ravie LakshmananCybersecurity / Malware A threat actor that’s known to share overlaps…
-
Data BreachSecurity
Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files
by adminby adminOct 06, 2025Ravie LakshmananEmail Security / Zero-Day A now patched security vulnerability in Zimbra…
-
Data BreachSecurity
Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers
by adminby adminOct 06, 2025Ravie LakshmananMalware / Data Breach Cybersecurity researchers have shed light on a…
-
Data BreachSecurity
Chinese APT group Phantom Taurus targets gov and telecom organizations
by adminby adminResearchers have documented a previously unknown threat actor that aligns with China’s intelligence collection…
-
Oct 06, 2025Ravie LakshmananCybersecurity / Hacking News The cyber world never hits pause, and…
-
“We’re hiring selectively for AI and machine learning expertise, but we’re also investing in…