Apache has released a security update that addresses an important vulnerability in Tomcat web server that could lead to an…
A seemingly benign health app, “BMI CalculationVsn,” was found on the Amazon App Store, which secretly collected sensitive user data,…
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial sample (MD5 14f6c034af7322156e62a6c961106a8c) provided valuable…
KEY SUMMARY POINTS Compromised npm Packages: On December 20, 2024, attackers used a hijacked npm token to compromise popular npm…
Dec 23, 2024Ravie LakshmananPhishing / Cybercrime An interruption to the phishing-as-a-service (PhaaS) toolkit called Rockstar 2FA has led to a…
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through malicious packages disguised as legitimate…
The Italian Data Protection Authority (known as “Il Garante”) has imposed a €15 million fine on OpenAI for violations of…
The Lazarus Group has recently employed a sophisticated attack, dubbed “Operation DreamJob,” to target employees in critical sectors like nuclear…
The 2025 cybersecurity landscape is increasingly complex, driven by sophisticated cyber threats, increased regulation, and rapidly evolving technology. In 2025,…
Developing new drugs is risky and expensive. Creating a new drug and bringing it to clinical trials can cost billions…
The modern world relies on Application Programming Interfaces (APIs). They allow applications to communicate with each other, servers, and consumers…
Researchers have successfully bypassed the Wi-Fi Protected Access 3 (WPA3) protocol to obtain network passwords using a combination of Man-in-the-Middle…











