China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one of its foremost commercial cryptography providers,…
Two individuals have been arrested in a joint international operation dismantling JokerOTP, a sophisticated phishing tool used to intercept 2FA…
Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even…
The UK could save £200bn if the workforce adopts artificial intelligence (AI) to improve productivity. That is the headline finding…
What is also clear from the documents is that US police are aware of the control corporations have over their…
A security researcher has uncovered a critical vulnerability in iOS, Apple’s flagship mobile operating system. The flaw, CVE-2025-24091, which leverages…
PoC rootkit Curing evades traditional Linux detection systems Pierluigi Paganini April 28, 2025 Researchers created a PoC rootkit called Curing…
Why Application Security is Non-Negotiable The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application…
CVE-2025-31324, a critical vulnerability in the SAP NetWeaver platform, is being actively exploited by attackers to upload malicious webshells to…
Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign undertaken by a new advanced…
Attackers chained Craft CMS zero-days attacks in the wild Pierluigi Paganini April 28, 2025 Orange Cyberdefense’s CSIRT reported that threat…
A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including the RM4100, RM4200, EM4100, RM5110, RM5111,…











