As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has…
U.S. CISA adds Ivanti Connect Secure, Policy Secure, and ZTA Gateways flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini…
The zero-day attacks leveraging the Ivanti Connect Secure (ICS) vulnerability (CVE-2025-0282) made public on Wednesday were first spotted in mid-December…
Jan 09, 2025The Hacker NewsData Protection / Encryption Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online…
What makes a cybersecurity professional stand out in today’s rapidly evolving digital landscape? Is it their technical prowess, their ability…
The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in a sophisticated attack that compromises the…
Jan 09, 2025Ravie LakshmananCybersecurity / Malware Japan’s National Police Agency (NPA) and National Center of Incident Readiness and Strategy for…
The Australian Government has shared its insights and developments regarding the Commonwealth’s cybersecurity measures. The Commonwealth Cybersecurity Posture 2024 provides…
The Green Bay Packers, Inc. has confirmed that its online merchandise store was hacked, leading to the theft of credit…
Then, between Christmas Eve and New Year’s, came a new deluge of swattings. They hit close to a hundred politicians…
A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which has stolen data from Arrotex Pharmaceuticals…
Jan 09, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors are attempting to take advantage of a recently disclosed security flaw…











