Trump cyber executive order takes aim at prior orders, secure software, more
President Donald Trump signed an executive order Friday that the White House says promotes developing secure software, adopting the latest...
Read more →President Donald Trump signed an executive order Friday that the White House says promotes developing secure software, adopting the latest...
Read more →The AhnLab Security Intelligence Center (ASEC) has recently issued a detailed report confirming the persistent distribution of ViperSoftX malware by...
Read more →A critical heap-based buffer overflow vulnerability, tracked as CVE-2025-24993, has been discovered in the Windows New Technology File System (NTFS),...
Read more →A sophisticated new social engineering attack campaign has emerged that exploits users’ familiarity with routine security checks to deliver malware...
Read more →For years, gray market services known as “bulletproof” hosts have been a key tool for cybercriminals looking to anonymously maintain...
Read more →The latest wave of Mirai botnet activity has resurfaced with a refined attack chain exploiting CVE-2024-3721, a critical command injection...
Read more →Russia-linked threat actors targets Ukraine with PathWiper wiper Pierluigi Paganini June 06, 2025 A Russia-linked threat actor targeted a critical...
Read more →DragonForce, a sophisticated ransomware operation that emerged in fall 2023, has established itself as a formidable threat in the cybercriminal...
Read more →As small businesses increasingly adopt artificial intelligence (AI) tools to streamline operations, cybercriminals are seizing the opportunity to deploy ransomware...
Read more →U.S. tax resolution firm Optima Tax Relief suffered a Chaos ransomware attack, with the threat actors now leaking data stolen...
Read more →A sophisticated cyber attack campaign has emerged targeting Ukraine’s critical infrastructure, utilizing a previously unknown destructive malware variant that researchers...
Read more →Sophos X-Ops researchers have identified over 140 GitHub repositories laced with malicious backdoors, orchestrated by a single threat actor associated...
Read more →