New SHAMOS Malware Attacking macOS Via Fake Help Websites to Steal Login Credentials
A sophisticated malware campaign targeting macOS users has emerged between June and August 2025, successfully attempting to compromise over 300...
Read more →A sophisticated malware campaign targeting macOS users has emerged between June and August 2025, successfully attempting to compromise over 300...
Read more →Cybersecurity researchers are highlighting a dangerous attack technique that combines rogue IPv6 configuration with NTLM credential relay to achieve complete...
Read more →A Scattered Spider member gets 10 years in prison Pierluigi Paganini August 21, 2025 A 20-year-old Scattered Spider member gets...
Read more →CISA issued four comprehensive Industrial Control Systems (ICS) advisories on August 19, 2025, highlighting serious vulnerabilities affecting critical infrastructure sectors...
Read more →Security researchers at Imperva have disclosed a critical pre-handshake memory exhaustion vulnerability in the widely-used LSQUIC QUIC implementation that enables...
Read more →Aug 21, 2025Ravie LakshmananData Breach / Cybercrime A 20-year-old member of the notorious cybercrime gang known as Scattered Spider has...
Read more →Noah Michael Urban, a key member of the Scattered Spider cybercrime collective, was sentenced to 10 years in prison on...
Read more →A sophisticated attack chain that combines MITM6 with NTLM relay techniques to achieve full Active Directory domain compromise. The attack...
Read more →FBI: Russia-linked group Static Tundra exploit old Cisco flaw for espionage Pierluigi Paganini August 21, 2025 FBI warns FSB-linked group...
Read more →A critical security vulnerability has been discovered in Microsoft’s VS Code Remote-SSH extension that allows attackers to execute malicious code...
Read more →Federal authorities have charged a 22-year-old Oregon man with operating one of the most powerful distributed denial-of-service (DDoS) botnets ever...
Read more →Organizations are increasing investments in cloud, AI, and emerging technologies, but their infrastructure and security strategies often lag behind. A...
Read more →