Chrome Exploit CVE-2025-10585: Urgent Google Update
Google has issued an urgent security alert for all users of its Chrome browser, confirming that an active exploit targeting a critical vulnerability, CVE-2025-10585, is…
Google has issued an urgent security alert for all users of its Chrome browser, confirming that an active exploit targeting a critical vulnerability, CVE-2025-10585, is…
The Jaguar Land Rover cyberattack that has shuttered production lines since September 1 will extend for at least another week, and some observers warn that…
BreachForums founder Conor Brian Fitzpatrick has been resentenced to three years in prison on charges related to operation of the notorious cybercrime forum and possession…
Romanian prosecutor general this week said investigators uncovered a large, coordinated hybrid campaign that sought to skew the 2024 presidential vote in favor of a…
Microsoft and Cloudflare dealt a major blow against RaccoonO365, a subscription-based phishing-as-a-service (PhaaS) platform that has fueled thousands of credential theft campaigns since mid-2024. In…
More than 20 CrowdStrike NPM packages were among nearly 200 NPM packages hit by a sophisticated supply chain attack. The compromised packages were quickly removed…
At Black Hat USA 2025, The Cyber Express, in collaboration with Suraksha Catalyst, released Episode 7 of its CISO Podcast Series, focusing on a theme…
Cyble threat intelligence researchers have uncovered an infostealer campaign that spreads the Maranhão Stealer through social engineering websites claiming to offer pirated software, cracked game…
China is ramping up its cybersecurity enforcement with new regulations requiring network operators to report severe cybersecurity incidents within one hour. The rules, announced by…
A severe security vulnerability has been discovered in FlowiseAI, an open-source AI workflow automation tool, exposing users to the risk of complete account compromise. Tracked…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a manufacturing operations management software vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, a rare…
Cybercrime and online scams have officially overtaken traditional threats as the primary regional security concern for the Association of Southeast Asian Nations (ASEAN). This ASEAN…