Blind Eagle targeted 1,600 victims in Colombia using spear-phishing, exploiting CVE-2024-43451, and distributing malware via ...
Ballista botnet exploits TP-Link router flaw CVE-2023-1389, infecting 6,000+ devices worldwide and evolving to use TOR.
Compliance isn’t security. Adversarial Exposure Validation reveals exploitable vulnerabilities, helping teams cut through the ...
SideWinder APT expands attacks on maritime, nuclear, and IT sectors, rapidly modifying malware to evade detection.
Moxa fixes CVE-2024-12297, a critical PT switch flaw (CVSS 9.2) enabling authentication bypass. Users must update firmware or ...
CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List | Read more hacking news ...
The activity, attributed to a threat actor dubbed Desert Dexter, was discovered in February 2025. It chiefly involves ...
Hackers use polymorphic browser extensions to mimic real add-ons, steal credentials, and hijack accounts. Affects Chrome, ...
Google Workspace security demands a unified approach—eliminate blind spots, automate remediation, and stop threats before they strike.
State-sponsored hacking, IoT botnets, ransomware shifts—this week's cyber roundup covers it all. Stay informed, stay secure.
In today's threat landscape, identity security demands more than just prevention. By combining SSPM with ITDR, organizations ...
CTM360 detects 6,000+ fake Google Play pages spreading PlayPraetor malware, stealing banking credentials and MFA codes for ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results