Attackers actively exploit critical zero-day in Alone WordPress Theme Pierluigi Paganini July 31, 2025 Hackers exploit a critical vulnerability, tracked…
A coalition of information-sharing groups urged their members on Wednesday to take additional steps to mitigate potential attacks by the…
A Russian nation-state threat group has been spying on foreign diplomats, managing continuous access to their communications and data in…
Proton has launched Proton Authenticator, a free standalone two-factor authentication (2FA) application for Windows, macOS, Linux, Android, and iOS. 2FA authenticator…
North Korean threat actors have evolved their cybercriminal operations into a sophisticated digital deception campaign that has successfully siphoned at…
The Russian state hacker group known as Turla has carried out some of the most innovative hacking feats in the…
A Bangalore-based technology professional has been arrested in connection with a massive cryptocurrency theft worth approximately ₹379 crore ($44 million)…
The Competition and Markets Authority (CMA) has confirmed Microsoft and Amazon Web Services (AWS) will face “targeted and bespoke” interventions…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…
Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance, targeted scanning, and brute-forcing…
In 2025, modernizing outdated IT infrastructure is key for organizations aiming to stay competitive, secure, and scalable. Finding a reliable…
Researchers at zLabs have been closely monitoring the DoubleTrouble banking trojan, a rapidly evolving malware strain that has shifted its…











