IPFire 2.29 Core Update 198 marks a significant advancement for users of this open-source firewall, introducing enhanced Intrusion Prevention System…
Security researchers have discovered a sophisticated phishing technique that weaponizes invisible Unicode characters embedded within email subject lines using MIME…
A new data-stealing MALWARE called RedTiger is being used by cybercriminals to target gamers on the popular chat platform Discord….
Nozomi Networks announced a cybersecurity solution designed to safely automate threat response in operational environments. With the latest release of…
Varonis Threat Labs is shining a spotlight on a decade-old vulnerability that opens the door to URL spoofing. By exploiting…
A sophisticated malware campaign targeting Brazilian users has emerged with alarming capabilities. The Water Saci campaign, identified by Trend Micro…
The Brida security testing toolkit has released version 0.6, marking a significant update that brings full compatibility with the latest…
CVE-2025-2783, a Chrome zero-day vulnerability that was detected being exploited in March 2025 and was subsequently fixed by Google, was…
TLDR: Excessive Data Exposure (leaking internal data via API responses) is the silent, pervasive threat that is more dangerous than…
A new malware-as-a-service (MaaS) platform named Atroposia provides cybercriminals a remote access trojan that combines capabilities for persistent access, evasion,…
A critical vulnerability in Ubuntu’s Linux kernel has been exposed, allowing local attackers to escalate privileges and potentially gain root…
A sophisticated new Android banking Trojan named Herodotus has emerged as a significant threat to mobile users, introducing a novel…











