Nov 18, 2025Ravie LakshmananCyber Espionage / Malware Suspected espionage-driven threat actors from Iran have…
how to hack
-
-
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute…
-
Vulnerability
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
Nov 22, 2025Ravie LakshmananZero-Day / Software Security The U.S. Cybersecurity and Infrastructure Security Agency…
-
Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence Update: The NHS England Digital, in an…
-
Nov 21, 2025Ravie LakshmananVulnerability / Threat Mitigation Grafana has released security updates to address…
-
Vulnerability
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
Nov 21, 2025Ravie LakshmananData Protection / Technology In a surprise move, Google on Thursday…
-
A China-nexus threat actor known as APT24 has been observed using a previously undocumented…
-
Nov 21, 2025Ravie LakshmananData Breach / SaaS Security Salesforce has warned of detected “unusual…
-
Nov 20, 2025Ravie LakshmananBotnet / Malware Cybersecurity researchers have warned of an actively expanding…
-
Vulnerability
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
Nov 20, 2025Ravie LakshmananVulnerability / Cloud Computing Oligo Security has warned of ongoing attacks…
