Category: CyberSecurityNews
Malicious stockpiled domains are the collection of domain names that threat actors acquire in advance for several types of future…
Kernel vulnerabilities are prevalent in operating systems and can affect billions of devices. One of the most widely used tools…
A landmark settlement has been reached in a class-action lawsuit against Google, accusing the tech giant of breaching user privacy…
Bug bounty platforms play a crucial role in the cybersecurity ecosystem by enabling organizations to leverage the expertise of external…
By employing a multitude of advanced techniques like double extortion along with other illicit tactics, ransomware groups are continually evolving…
Threat actors, particularly those with financial motivations, have been observed spreading malware via the ms-appinstaller URI scheme (App Installer). As…
Palo Alto Networks (PANW), the cybersecurity juggernaut, has officially acquired Talon Cyber Security, a pioneer in enterprise browser technology. This…
In recent times, due to rapid advancements in technology, increased connectivity, and sophisticated tactics that threat actors use, cyber attacks…
Hackers use weaponized LNK files to exploit vulnerabilities in Windows operating systems. These files often contain malicious code that can…
The biggest producer of probiotic drinks in the world, Yakult, was the target of a significant that exposed private data…
As carols resonated in the air and families convened, the cyber underworld ushered in a chilling twist to Christmas –…
Several vulnerabilities have been identified and exploited by threat actors in the wild this year for several malicious purposes, such…










