A Fresh Take on Open-Source Intel
Check out the top OSINT tools of 2025, an updated list featuring the best free and paid open-source intelligence tools for cybersecurity and investigations. At…
Check out the top OSINT tools of 2025, an updated list featuring the best free and paid open-source intelligence tools for cybersecurity and investigations. At…
Following reports of unauthorized access to a legacy Oracle cloud environment, CISA warns of potential credential compromise leading to phishing, network breaches, and data theft.…
Security researchers report CVE-2025-32433, a CVSS 10.0 RCE vulnerability in Erlang/OTP SSH, allowing unauthenticated code execution on exposed systems. A newly disclosed vulnerability in the…
Qrator Labs reports it mitigated a massive record 965 Gbps DDoS attack in April 2025, the largest incident reported this year so far. A powerful…
MetaTrader is a key tool for traders, offering a comprehensive platform that supports various financial instruments. Understanding its capabilities is important for effective trading. This…
Researchers reveal a large-scale ransomware campaign leveraging over 1,200 stolen AWS access keys to encrypt S3 buckets. Learn how attackers used SSE-C silently and the…
MITRE avoids CVE program shutdown with last-minute contract extension. Questions remain about long-term funding and the future of vulnerability tracking. MITRE’s role in managing the…
BidenCash, a dark web carding marketplace known for its aggressive tactics, has leaked a fresh batch of 910,380 stolen credit card records on the Russian-language…
Hertz confirms data breach linked to Cleo software flaw; Cl0p ransomware group leaked stolen data, exposing names, driver’s licenses, and credit card details. Car rental…
Palo Alto, California, April 16th, 2025, CyberNewsWire SquareX researchers Jeswin Mathai and Audrey Adeline will be disclosing a new class of data exfiltration techniques at…
Keeping up with crypto tax laws in Europe feels like a constant hurdle. Regulations evolve, tax authorities demand precise reporting, and tracking every trade across…
CloudSEK uncovers a sophisticated malware campaign where attackers impersonate PDFCandy.com to distribute the ArechClient2 information stealer. Learn how this scam works and how to protect…