Threat Actors Leveraging Open-Source AdaptixC2 in Real-World Attacks
In early May 2025, security teams began observing a sudden rise in post-exploitation activity leveraging an open-source command-and-control framework known...
Read more →In early May 2025, security teams began observing a sudden rise in post-exploitation activity leveraging an open-source command-and-control framework known...
Read more →A critical flaw in CoreDNS’s etcd plugin can let attackers pin DNS records in caches for years, effectively blocking legitimate...
Read more →A phishing scam is exploiting Google’s trusted AppSheet platform to bypass email filters. Learn how hackers are using legitimate tools...
Read more →WASHINGTON – The head of the United Kingdom’s top cybersecurity agency called for an increased focus on ensuring the continuity...
Read more →A new Spectre-like attack dubbed VMScape allows a malicious virtual machine (VM) to leak cryptographic keys from an unmodified QEMU...
Read more →In early March 2025, security teams first observed an unprecedented L7 DDoS botnet targeting web applications across multiple sectors. The...
Read more →Remote work is here to stay, with nearly a quarter of the U.S. workforce (22%) expected to be working remotely by 2025....
Read more →In a stark reminder of how vulnerable online services remain, Qrator Labs has revealed that a sprawling Layer 7 distributed...
Read more →Over a year after SonicWall patched CVE-2024-40766, a critical flaw in its next-gen firewalls, ransomware attackers are still gaining a...
Read more →Google fixes critical Chrome flaw, researcher earns $43K Pierluigi Paganini September 11, 2025 Google addressed a critical use-after-free vulnerability in...
Read more →AI auto-generating exploits from CVEs for $3, not actually but Memory Integrity Enforcement makes it harder, surprisingly NPM packages were...
Read more →A previously unknown advanced persistent threat (APT) group has unleashed a new fileless malware framework, dubbed EggStreme, in a highly...
Read more →