Attackers have exploited a now-fixed vulnerability (CVE-2025-12480) in the Gladinet Triofox secure file sharing and remote access platform while it…
One of the reassuring things about owning an iPhone was knowing you could lock it if it got lost or…
Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that’s sold on Russian-speaking…
National Highways has penned an extension to its IT services contract with CGI for an additional five years as part…
A security vulnerability has been discovered in Zoom Workplace VDI Client for Windows that could allow attackers to gain elevated…
The notorious APT-C-08 hacking group, also known as BITTER, has been observed weaponizing a critical WinRAR directory traversal vulnerability (CVE-2025-6218) to…
GNU Coreutils is the backbone of many enterprise Linux environments. It provides the basic file, shell, and text utilities that…
This attempt to phish credentials caught our attention, mostly because of its front-end simplicity. Even though this is a script-kiddie-level…
Nov 11, 2025Ravie LakshmananSoftware Supply Chain / Malware Cybersecurity researchers have discovered a malicious npm package named “@acitons/artifact” that typosquats…
One in five people in the UK say they will only act on a message if it comes from a…
A critical vulnerability in WatchGuard Firebox firewalls could allow attackers to gain complete administrative access to the devices without any…
SAP has released a significant security update addressing 18 new vulnerabilities across its enterprise software portfolio, including several critical flaws…