DrayTek routers face active exploitation of older vulnerabilities
27
Mar
2025

DrayTek routers face active exploitation of older vulnerabilities

Dive Brief: Researchers warn that three older vulnerabilities in DrayTek routers have been actively exploited in recent weeks, which coincides…

Intelligence chiefs insist Signal chat was a simple mistake
27
Mar
2025

Intelligence chiefs insist Signal chat was a simple mistake

U.S. intelligence leaders found themselves under intensified scrutiny from Congress for a second straight day, following revelations that significant military…

Editor
27
Mar
2025

Zero-click exploit abusing Firefox and Windows zero days

The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds 26 Nov…

Operation Red Card - 300+ Cyber Criminals Arrested Linking to Multiple Hacking Activities
24
Mar
2025

Operation Red Card – 300+ Cyber Criminals Arrested Linking to Multiple Hacking Activities

INTERPOL led a multi-national law enforcement operation dubbed “Operation Red Card,” which has resulted in the arrest of over 300…

Protecting your personal information from data brokers
24
Mar
2025

Protecting your personal information from data brokers

How aware are you that your personal information could be bought and sold without your consent—and that there are companies…

Why I am challenging Yvette Cooper’s ‘secret back door’ order against Apple’s encryption
24
Mar
2025

Why I am challenging Yvette Cooper’s ‘secret back door’ order against Apple’s encryption

Security is hard. It’s even harder now that, apparently, the UK Government has secretly ordered Apple to reduce the security…

SuperBlack ransomware strain used in attacks targeting Fortinet vulnerabilities
24
Mar
2025

Critical Apache Tomcat RCE vulnerability exploited

Dive Brief: Researchers from GreyNoise on Thursday reported active exploitation of CVE-2025-24813, a critical remote code execution vulnerability in Apache Tomcat…

Editor
24
Mar
2025

A new chapter in UEFI threats

ESET researchers make a discovery that signals a shift on the UEFI threat landscape and underscores the need for vigilance…

Hackers Using Fake Semrush Ads to Steal Google Accounts Login Credentials
24
Mar
2025

Hackers Using Fake Semrush Ads to Steal Google Accounts Login Credentials

A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing a significant threat to digital…

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience
24
Mar
2025

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience

Paris, France, March 24th, 2025, CyberNewsWire Arsen, a leading cybersecurity company specializing in social engineering defense, today announced the full…

Naveen Goud
24
Mar
2025

North Korea establish Military Cyber Center to conduct espionage

In recent years, intelligence agencies in Western countries have reached a troubling conclusion: North Korea, led by Kim Jong Un,…

3 Victims, $5K Entry Fee, Multi-OS, and Double Extortion Tactics
24
Mar
2025

3 Victims, $5K Entry Fee, Multi-OS, and Double Extortion Tactics

Mar 24, 2025Ravie LakshmananMalware / Ransomware A ransomware-as-a-service (RaaS) operation called VanHelsing has already claimed three victims since it launched…