India And Israel Sign MoU To Boost Defense, Cybersecurity
05
Nov
2025

India And Israel Sign MoU To Boost Defense, Cybersecurity

India and Israel have taken a decisive step toward deepening their strategic partnership with the signing of a Memorandum of…

Silent Lynx APT New Attack Targeting Governmental Employees Posing as Officials
05
Nov
2025

Silent Lynx APT New Attack Targeting Governmental Employees Posing as Officials

Silent Lynx, a sophisticated threat group that has been tracked since 2024, continues its relentless espionage campaign against government entities…

Hackers Abuse OneDrive.exe via DLL Sideloading to Run Malicious Code
05
Nov
2025

Hackers Abuse OneDrive.exe via DLL Sideloading to Run Malicious Code

Security researchers have discovered a sophisticated attack technique that exploits Microsoft’s OneDrive application to execute malicious code without detection. The…

VulnRisk: Open-source vulnerability risk assessment platform
05
Nov
2025

VulnRisk: Open-source vulnerability risk assessment platform

VulnRisk is an open-source platform for vulnerability risk assessment. It goes beyond basic CVSS scoring by adding context-aware analysis that…

XLoader Malware Analyzed Using ChatGPT’s, Breaks RC4 Encryption Layers in Hours
05
Nov
2025

XLoader Malware Analyzed Using ChatGPT’s, Breaks RC4 Encryption Layers in Hours

XLoader remains one of the most challenging malware families confronting cybersecurity researchers. This sophisticated information-stealing loader emerged in 2020 as…

Attackers Exploit Microsoft Teams Flaws to Manipulate Messages and Fake Notifications
05
Nov
2025

Attackers Exploit Microsoft Teams Flaws to Manipulate Messages and Fake Notifications

Check Point Research uncovered four critical vulnerabilities in Microsoft Teams that could allow attackers to impersonate executives, manipulate messages, alter…

Connected homes: Is bystander privacy anyone's responsibility?
05
Nov
2025

Connected homes: Is bystander privacy anyone’s responsibility?

Smart doorbells, connected cameras, and home monitoring systems have become common sights on doorsteps and living rooms. They promise safety…

WordPress Post SMTP Plugin Vulnerability Exposes 400,000 Websites to Account Takeover Attacks
05
Nov
2025

WordPress Post SMTP Plugin Vulnerability Exposes 400,000 Websites to Account Takeover Attacks

A critical security flaw in the WordPress Post SMTP plugin has left more than 400,000 websites vulnerable to account takeover…

DragonForce Cartel Surfaces from Leaked Conti v3 Ransomware Source Code
05
Nov
2025

DragonForce Cartel Surfaces from Leaked Conti v3 Ransomware Source Code

Acronis Threat Research Unit has analyzed recent activity linked to the DragonForce ransomware group and identified a new malware variant…

5 Actionable Tactics for SOC Analysts
05
Nov
2025

5 Actionable Tactics for SOC Analysts

Security teams drown in alerts but starve for insight. Blocklists catch the obvious. SIEM correlation gives clues. But only context…

Social Media Platforms Face New Age Restrictions from December 2025
05
Nov
2025

Social Media Platforms Face New Age Restrictions from December 2025

The eSafety Commissioner has released updated guidance to help the online industry and the public prepare for Australia’s new Social…

RondoDox Botnet Updated Their Arsenal with 650% More Exploits Targeting Enterprises
05
Nov
2025

RondoDox Botnet Updated Their Arsenal with 650% More Exploits Targeting Enterprises

A sophisticated evolution of the RondoDox botnet has emerged with a staggering 650% increase in exploitation capabilities, marking a significant…