New TorNet backdoor Abusing Windows Schedule Task to Deliver Malware
A financially motivated threat actor has been linked to a sophisticated cyber campaign that has been targeting users in Poland...
Read more →A financially motivated threat actor has been linked to a sophisticated cyber campaign that has been targeting users in Poland...
Read more →PowerSchool, a leading U.S.-based education technology provider, has begun notifying students, teachers, and other affected individuals following a massive data...
Read more →Ransomware attacks targeting the healthcare sector have become increasingly challenging to manage due to financial losses and the risks posed...
Read more →Broadcom disclosed a critical vulnerability affecting its Avi Load Balancer product. The vulnerability, identified as CVE-2025-22217, is an unauthenticated blind...
Read more →The Akira ransomware group, a prominent player in the Ransomware-as-a-Service (RaaS) domain since March 2023, has intensified its operations with...
Read more →A critical Insecure Direct Object Reference (IDOR) vulnerability has been identified in One Identity Manager, a widely used identity and...
Read more →A sophisticated phishing campaign targeting Amazon Prime members has been uncovered, aiming to steal credit card information and other sensitive...
Read more →Google has rolled out a new Stable Channel Update for its Chrome browser, addressing critical security vulnerabilities that posed significant...
Read more →U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS) advisories to address significant vulnerabilities in critical...
Read more →The New York State Department of Financial Services (NYDFS) has imposed a $2 million fine on PayPal, Inc. for violations...
Read more →Over 379 Ivanti Connect Secure (ICS) devices were found to be backdoored following the exploitation of a critical zero-day vulnerability,...
Read more →New ransomware strains are quietly infiltrating VMware ESXi hosts by setting up SSH tunnels and concealing malicious traffic within legitimate...
Read more →