CISA, FBI warn of fast flux technique used to hide malicious servers
04
Apr
2025

CISA, FBI warn of fast flux technique used to hide malicious servers

The FBI, the Cybersecurity and Infrastructure Security Agency and a group of international partners on Thursday warned that cyber threat…

Cryptocurrency theft
04
Apr
2025

PoisonSeed phishing campaign behind emails with wallet seed phrases

A large-scale phishing campaign dubbed ‘PoisonSeed’ compromises corporate email marketing accounts to distribute emails containing crypto seed phrases used to drain…

New Credit Card Skimming Campaign Uses Browser Extensions to Steal Financial Data
04
Apr
2025

New Credit Card Skimming Campaign Uses Browser Extensions to Steal Financial Data

A newly discovered credit card skimming campaign, dubbed “RolandSkimmer,” is exploiting browser extensions to exfiltrate sensitive financial data. This advanced…

Linux: Get Realtime Bandwidth Statistics Using Stock Commands
04
Apr
2025

Linux: Get Realtime Bandwidth Statistics Using Stock Commands

Have you ever been in Linux and wanted to watch how much bandwidth was going in and out of your…

Head of NSA and US Cyber Command reportedly fired
04
Apr
2025

Head of NSA and US Cyber Command reportedly fired

Dive Brief: Multiple news outlets reported Thursday night that the Trump administration fired Gen. Timothy D. Haugh, director of the…

Hacker
04
Apr
2025

Australian pension funds hit by wave of credential stuffing attacks

Over the weekend, a massive wave of credential stuffing attacks hit multiple large Australian super funds, compromising thousands of members’…

Critical Apache Parquet Vulnerability Allows Remote Code Execution
04
Apr
2025

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within its parquet-avro module. This flaw, tracked as CVE-2025-30065, exposes…

Jane Devry
04
Apr
2025

The Rise of SSE and SASE: What’s Changed from 2024 to 2025?

Introduction The evolution of Security Service Edge (SSE) adoption from 2024 to 2025 reflects significant shifts in enterprise security strategies,…

The Future: Personal Assistants (Companions)
04
Apr
2025

The Future: Personal Assistants (Companions)

As technology continues to be come more compact and more powerful, I think one of the biggest consumer/business breakthroughs is…

Malicious PDFs Responsible for 22% of All Email-Based Cyber Threats
04
Apr
2025

Malicious PDFs Responsible for 22% of All Email-Based Cyber Threats

Malicious PDF files have emerged as a dominant threat vector in email-based cyberattacks, accounting for 22% of all malicious email…

Naveen Goud
04
Apr
2025

Hunters International Ransomware moves to data exfiltration and data extortion

Ransomware gangs are notorious for first stealing data from servers before encrypting it, holding it hostage until a ransom is…

Verizon logo
04
Apr
2025

Flaw in Verizon call record requests put millions of Americans at risk

Security researcher Evan Connelly discovered an enormous flaw affecting one of the largest telecommunications companies in the world that could…