Zoom for Windows Flaw Allows Attackers to Trigger DoS Attacks
Security researchers have uncovered two significant vulnerabilities in Zoom Clients for Windows, exposing users to potential Denial of Service (DoS)...
Read more →Security researchers have uncovered two significant vulnerabilities in Zoom Clients for Windows, exposing users to potential Denial of Service (DoS)...
Read more →The Cybereason Global Security Operations Center (GSOC) has uncovered a sophisticated campaign by threat actors who are exploiting compromised WordPress...
Read more →Arctic Wolf has uncovered a cunning cybersecurity threat that exploits search engine optimization (SEO) poisoning and malvertising tactics to distribute...
Read more →A China-Nexus Threat Actor has launched a highly advanced assault against China Mobile Tietong Co., Ltd., a division of China...
Read more →A chilling discovery by Koi Security has exposed a sophisticated browser hijacking campaign dubbed “RedDirection,” compromising over 1.7 million users...
Read more →A recent in-depth analysis by threat intelligence experts sheds critical light on the pervasive issue of outdated and unreliable data...
Read more →Monero (XMR), a cryptocurrency, saw a spectacular surge in early 2025, rising 45% from $196 to $285 by May, with...
Read more →A newly identified ransomware group, BERT, tracked by Trend Micro as Water Pombero, has emerged as a significant threat to...
Read more →Check Point Research has revealed important details about the phishing domain patterns and advanced attack techniques of the infamous Scattered...
Read more →Cyble Research and Intelligence Labs (CRIL) recently discovered a very advanced phishing campaign that used the LogoKit phishing kit, which...
Read more →Ivanti has released critical security updates for its Connect Secure and Policy Secure products, addressing six medium-severity vulnerabilities that could...
Read more →Fortinet has disclosed a critical security vulnerability in FortiOS that could allow authenticated attackers to execute arbitrary code through a...
Read more →