Check Point analyzes Chinese APT Storm-2603
ToolShell under siege: Check Point analyzes Chinese APT Storm-2603 Pierluigi Paganini August 01, 2025 Storm-2603 group exploits SharePoint flaws and...
Read more →ToolShell under siege: Check Point analyzes Chinese APT Storm-2603 Pierluigi Paganini August 01, 2025 Storm-2603 group exploits SharePoint flaws and...
Read more →Here’s a look at cybersecurity stories that moved the needle, raised the alarm, or offered vital lessons in July 2025...
Read more →Microsoft has significantly enhanced its .NET bounty program, announcing substantial updates that expand the program’s scope, streamline award structures, and...
Read more →Outflank is pioneering the integration of large language models (LLMs) to expedite research and development workflows while maintaining rigorous quality...
Read more →Amazon Web Services (AWS) reported a 17.5% year-on-year increase in revenue to $30.9bn during the second quarter of its 2025...
Read more →The Zero Day Initiative is offering a $1 million reward to security researchers who will demonstrate a zero-click WhatsApp exploit...
Read more →Trend Micro’s Zero Day Initiative (ZDI) announces an unprecedented $1,000,000 bounty for a zero-click remote code execution (RCE) exploit targeting...
Read more →Cybercriminals are increasingly exploiting link wrapping features from vendors like Proofpoint and Intermedia to mask malicious payloads, leveraging the inherent...
Read more →Aug 01, 2025Ravie LakshmananThreat Intelligence / Ransomware The threat actor linked to the exploitation of the recently disclosed security flaws...
Read more →CISA released two high-severity Industrial Control Systems (ICS) advisories on July 31, 2025, highlighting critical vulnerabilities in widely deployed industrial...
Read more →Microsoft announced a significant security enhancement for Excel users, revealing plans to block external workbook links to unsafe file types...
Read more →The latest wave of credential-phishing campaigns has revealed an unexpectedly convenient ally for threat actors: the very e-mail security suites...
Read more →