5 Immediate Steps to be Followed After Clicking on a Malicious Link
11
Oct
2025

5 Immediate Steps to be Followed After Clicking on a Malicious Link

Clicking on a malicious link can quickly turn your device into a security risk. Just seconds after clicking, your browser…

'Happy Gilmore' Producer Buys Spyware Maker NSO Group
11
Oct
2025

‘Happy Gilmore’ Producer Buys Spyware Maker NSO Group

Research published this week indicates that North Korean scammers are trying to trick US companies into hiring them for architectural…

New Stealit Malware Exploits Node.js Extensions to Target Windows Systems
11
Oct
2025

New Stealit Malware Exploits Node.js Extensions to Target Windows Systems

Security researchers have identified a new, active campaign of the Stealit malware that uses an experimental Node.js feature to infect…

Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses
11
Oct
2025

Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses

A massive, coordinated botnet campaign is actively targeting Remote Desktop Protocol (RDP) services across the United States. Security firm GreyNoise…

New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities
11
Oct
2025

New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities

Along with the release of Kali Linux 2025.3, a major update introduces an innovative tool that combines artificial intelligence and cybersecurity:…

RondoDox IoT botnet swells to 56 exploits in shotgun campaign
11
Oct
2025

RondoDox IoT botnet swells to 56 exploits in shotgun campaign

Multiple security researchers have detailed a large escalation in the RondoDox Internet of Things (IoT) botnet campaign, which now weaponises…

Apple addressed the seventh actively exploited zero-day
11
Oct
2025

Apple doubles maximum bug bounty to $2M for zero-click RCEs

Apple doubles maximum bug bounty to $2M for zero-click RCEs Pierluigi Paganini October 10, 2025 Apple raised bug bounties to…

Polymorphic malware code sample
11
Oct
2025

New Polymorphic Malware Undetected By Security Tools

A new polymorphic malware identified by a security researcher earlier this week remains undetected by most security tools. Xavier Mertens…

Cybersecurity symbols
10
Oct
2025

Cybersecurity For Dummies, 3rd Edition eBook FREE for a Limited Time

In today’s hyper-connected world, cyber threats are more sophisticated and frequent than ever – ransomware attacks, data breaches, social engineering…

Windows 11
10
Oct
2025

Windows 11 23H2 Home and Pro reach end of support in 30 days

Microsoft has reminded customers again today that systems running Home and Pro editions of Windows 11 23H2 will stop receiving…

 Russian spyware ClayRat is spreading, evolving quickly, according to Zimperium
10
Oct
2025

 Russian spyware ClayRat is spreading, evolving quickly, according to Zimperium

A fast-spreading Android spyware is mushrooming across Russia, camouflaging itself as popular apps like TikTok or YouTube, researchers at Zimperium…

Card
10
Oct
2025

Hackers exploiting zero-day in Gladinet file sharing software

Threat actors are exploiting a zero-day vulnerability (CVE-2025-11371) in Gladinet CentreStack and Triofox products, which allows a local attacker to…