The Australian Academy of Technological Sciences and Engineering (ATSE) welcomed Melissa Price’s appointment as shadow minister for cybersecurity and the…
Today’s threat landscape, attack surfaces are expanding faster than most security teams can track. Every new cloud asset, exposed API,…
Companies want results fast, and low/no-code (LCNC) and Vibe Coding platforms promise just that: rapid application development with either no…
Pure Crypter, a well-known malware-as-a-service (MaaS) loader, has been recognized as a crucial tool for threat actors targeting Windows-based systems…
A newly emerged threat actor, going by the alias “Often9,” has posted on a prominent cybercrime and database trading forum,…
To understand the magnitude of the modern cybersecurity threat, it’s instructive to think of the global cybercrime industry as a…
Phishing scams used to be filled with awkward wording and obvious grammar mistakes. Not anymore. AI is now making it…
May 30, 2025Ravie LakshmananVulnerability / Threat Intelligence The China-linked threat actor behind the recent in-the-wild exploitation of a critical security…
With millions of businesses now using Amazon Web Services (AWS) for their cloud computing needs, it’s become a vital consideration…
A newly disclosed vulnerability, tracked as CVE-2025-27522, has been discovered in Apache InLong, a widely used real-time data streaming platform….
Chinese state-sponsored threat actor APT41 has targeted government entities with malware that uses Google Calendar for command-and-control (C&C), Google warns….
US Treasury sanctioned the firm Funnull Technology as major cyber scam facilitator Pierluigi Paganini May 30, 2025 The U.S. sanctioned…











