Hackers are exploiting ArrayOS AG VPN flaw to plant webshells
Threat actors have been exploiting a command injection vulnerability in Array AG Series VPN devices to plant webshells and create rogue users. Array Networks fixed…
Threat actors have been exploiting a command injection vulnerability in Array AG Series VPN devices to plant webshells and create rogue users. Array Networks fixed…
China-based phishing groups blamed for non-stop scam SMS messages about a supposed wayward package or unpaid toll fee are promoting a new offering, just in…
U.S. CISA adds a new an OpenPLC ScadaBR flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 04, 2025 U.S. Cybersecurity and Infrastructure Security Agency…
Leaked training videos suggest that Intellexa retained the ability to remotely access the systems of customers who had used its Predator spyware, raising questions about…
The UK’s National Cyber Security Center (NCSC) announced the testing phase of a new service called Proactive Notifications, designed to inform organizations in the country…
Qilin ransomware has listed the Church of Scientology on its dark web leak site, claiming responsibility for a breach and publishing 22 screenshots as proof…
In 2025, trust became the most exploited surface in modern computing. For decades, cyber security has centered on vulnerabilities, software bugs, misconfigured systems and weak…
Meta is expected to make budget cuts of up to 30 percent for its metaverse initiative, Bloomberg News reported, citing people familiar with the discussions.…
Three Greater London councils struck by a cyber attack last week are receiving response support from cyber security experts at NCC Group as they continue…
U.S. and Canadian cybersecurity agencies are warning that China-sponsored threat actors are using BRICKSTORM malware to compromise VMware vSphere environments. “Once compromised, the cyber actors…
Seqwater, South East Queensland’s water management authority, is looking for dedicated software to replace its spreadsheet-based asset and investment planning tools. The authority manages a wide range of…
The Predator spyware from surveillance company Intellexa has been using a zero-click infection mechanism dubbed “Aladdin,” which compromised specific targets by simply viewing a malicious…