Aug 12, 2025Ravie LakshmananThreat Intelligence / Enterprise Security Cybersecurity researchers are warning of a…
cyber attacks
-
-
Data BreachSecurity
Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers
by adminby adminOct 06, 2025Ravie LakshmananMalware / Data Breach Cybersecurity researchers have shed light on a…
-
Vulnerability
CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More
by adminby adminOct 02, 2025Ravie LakshmananThreat Intelligence / Cyber Attacks From unpatched cars to hijacked clouds,…
-
Cyber Attacks
Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine
by adminby adminCybersecurity researchers have discerned evidence of two Russian hacking groups Gamaredon and Turla collaborating…
-
Vulnerability
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild
by adminby adminOct 03, 2025Ravie LakshmananVulnerability / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency…
-
Vulnerability
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day
by adminby adminOct 04, 2025Ravie LakshmananVulnerability / Network Security Threat intelligence firm GreyNoise disclosed on Friday…
-
Oct 06, 2025Ravie LakshmananCybersecurity / Hacking News The cyber world never hits pause, and…
-
-
Vulnerability
Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks
by adminby adminOct 06, 2025Ravie LakshmananVulnerability / Threat Intelligence Oracle has released an emergency update to…
-
Cyber Attacks
EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations
by adminby adminThreat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software…