Threat Actors Leveraging Dynamic DNS Providers to Use for Malicious Purposes
Cybersecurity researchers are raising alarms about a growing threat vector as malicious actors increasingly exploit Dynamic DNS providers to establish...
Read more →Cybersecurity researchers are raising alarms about a growing threat vector as malicious actors increasingly exploit Dynamic DNS providers to establish...
Read more →A newly discovered DLL hijacking vulnerability in Notepad++, the popular source code editor, could allow attackers to execute arbitrary code...
Read more →A Google Project Zero researcher has detailed a novel technique for remotely leaking memory addresses on Apple’s macOS and iOS....
Read more →A sophisticated cybercriminal alliance between malware operators and covert North Korean IT workers has emerged as a significant threat to...
Read more →A sophisticated malvertising campaign is using fake Microsoft Teams installers to compromise corporate systems, leveraging poisoned search engine results and...
Read more →A critical security flaw has emerged in Apache Airflow 3.0.3, exposing sensitive connection information to users with only read permissions....
Read more →A sophisticated botnet operation has emerged, employing a Loader-as-a-Service model to systematically weaponize internet-connected devices across the globe. The campaign...
Read more →The cybersecurity landscape continues to evolve as three of the most notorious English-speaking cybercrime groups—LAPSUS$, Scattered Spider, and ShinyHunters—have been...
Read more →A new wave of cyberattacks targeting organizations using SonicWall firewalls has been actively deploying Akira ransomware since late July 2025....
Read more →LummaStealer has emerged as one of the most prolific information-stealing malware families in recent years, targeting victims across multiple industry...
Read more →A 17-year-old suspect who surrendered over his alleged role in the 2023 cyberattacks against two major Las Vegas casino operators...
Read more →A sophisticated new threat has emerged in the cybersecurity landscape that represents a significant evolution in malware development. The LAMEHUG...
Read more →