Google Launches Public Preview of Its Alert Triage and Investigation Agent for Security Operations
18
Nov
2025

Google Launches Public Preview of Its Alert Triage and Investigation Agent for Security Operations

Google has taken a significant step toward its vision of an Agentic SOC by announcing the public preview of the…

TPG Telecom reports triple zero death linked to Samsung handset
18
Nov
2025

TPG Telecom reports triple zero death linked to Samsung handset

TPG Telecom has reported a triple zero call-related customer fatality linked to the use of a Samsung mobile handset with…

ClickFix malware attacks evolve with multi-OS support, video tutorials
18
Nov
2025

Malicious NPM packages abuse Adspect redirects to evade security

Seven packages published on the Node Package Manager (npm) registry use the Adspect cloud-based service to separate researchers from potential victims and lead…

New Tool Blocks Network Traffic to Bypass EDR and Antivirus
18
Nov
2025

New Tool Blocks Network Traffic to Bypass EDR and Antivirus

A newly released open-source tool called SilentButDeadly is raising security concerns by demonstrating how attackers can effectively turn off Endpoint…

TPG Telecom reports triple zero death linked to Samsung handset
18
Nov
2025

TPG Telecom reports triple zero death linked to Samsung handset

TPG Telecom has reported a triple zero call-related customer fatality linked to the use of a Samsung mobile handset with…

Windows 11
18
Nov
2025

xAI’s Grok 4.1 rolls out with improved quality and speed for free

Elon Musk-owned xAI has started rolling out Grok 4.1, which is an upgrade to the existing Grok 4 model. xAI…

Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered
18
Nov
2025

Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered

A new threat has emerged in the ransomware landscape with the discovery of Yurei ransomware, first publicly identified in early…

Operating principle of secp256k1-ECIES.
18
Nov
2025

Encryption Mechanics, Operational Model, and Data Exfiltration Methods

A newly identified ransomware group, Yurei, has emerged as a significant threat to organizations worldwide, with confirmed attacks targeting entities…

RondoDox botnet malware now hacks servers using XWiki flaw
18
Nov
2025

RondoDox botnet malware now hacks servers using XWiki flaw

The RondoDox botnet malware is now exploiting a critical remote code execution (RCE) flaw in XWiki Platform tracked as CVE-2025-24893….

Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts
18
Nov
2025

Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts

Cybersecurity researchers have uncovered a dangerous new tool making waves across darknet forums and criminal communities. Xanthorox, a malicious artificial…

CISA Alerts on Critical Lynx+ Gateway Flaw Leaks Data in Cleartext
18
Nov
2025

CISA Alerts on Critical Lynx+ Gateway Flaw Leaks Data in Cleartext

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert regarding multiple vulnerabilities affecting General Industrial Controls’…

EU sanctions
18
Nov
2025

Dozens of groups call for governments to protect encryption 

On Monday, more than 60 digital commerce and trade groups called on governments around the globe to reject efforts or…