This blog explores the widespread and critical state of the React2Shell vulnerability. It provides a technical overview, suggested mitigations, and…
A China-nexus threat actor hacked into VMware vCenter environments at U.S.-based companies before deploying Brickstorm malware, security firm CrowdStrike warned…
The FBI warns that criminals are altering images shared on social media and using them as fake proof of life…
Madison, United States, December 5th, 2025, CyberNewsWire Sprocket Security is proud to announce that it has once again been recognized…
The MuddyWater threat group has escalated its cyber espionage operations by deploying UDPGangster, a sophisticated UDP-based backdoor designed to infiltrate…
Creative independence is reshaping how people tell their stories. Today, more creators are taking control of their own production from…
Cloudflare has successfully recovered its services after a second outage in the space of three weeks briefly took down Cloudflare…
Identity is effectively the new network boundary. It must be protected at all costs. 04 Dec 2025 • , 4…
Cybercriminals are actively spreading CoinMiner malware through USB drives, targeting workstations across South Korea to mine Monero cryptocurrency. This ongoing…
Cybercriminals continue to exploit USB drives as infection vectors, with recent campaigns delivering sophisticated CoinMiner malware that establishes persistent cryptocurrency-mining…
ClayRat, a new Android spyware, has drastically improved its abilities, making it a far greater threat than anticipated. Mobile security…
Flights to and from Edinburgh Airport are continuing to be beset by delays, after an undisclosed IT issue grounded passengers…
