A new threat targeting Chinese users has appeared with a dangerous ability to shut down security tools. RONINGLOADER, a multi-stage…
A severe remote code execution (RCE) flaw has been uncovered in pgAdmin4, the popular open-source interface for PostgreSQL databases. Dubbed…
Chinese government-backed hackers used Anthropic’s Claude Code tool to carry out advanced spying on about thirty targets worldwide, successfully breaking…
The United States issued a seizure warrant to Starlink this week related to satellite internet infrastructure used in a scam…
The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting North Korea’s illicit…
Attackers are using fake invoice emails to spread XWorm, a remote-access trojan that quietly steals login credentials, passwords, and sensitive…
A new malware family targeting macOS systems has emerged with advanced detection evasion techniques and multi-stage attack chains. Named DigitStealer,…
Phishing attacks continue to be one of the most persistent threats targeting organizations worldwide. Cybercriminals are constantly improving their methods…
U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini November 15, 2025 U.S. Cybersecurity and Infrastructure…
A new wave of Formbook malware attacks has appeared, using weaponized ZIP archives and multiple script layers to bypass security…
A new advisory from the Cybersecurity and Infrastructure Security Agency reveals that Akira ransomware has become one of the most…
Lumma Stealer has emerged as a serious threat in the cybercrime world, targeting users through fake software updates and cracked…
