The Current Landscape of Automotive Cybersecurity Modern vehicles are essentially computers on wheels. With up to 100 million lines of…
K7 Labs investigated the Cmimai Stealer, a Visual Basic Script (VBS)-based infostealer that surfaced in June 2025 and uses PowerShell…
11 Aug Teenage Hacker Stole $243M In Bitcoin. How It Happened. Posted at 08:34h in Blogs by Taylor Fox This…
The U.S. Department of Justice charged four Ghanaian nationals for their roles in a massive fraud ring linked to the theft of…
ClickFix has emerged as one of the most dangerous and rapidly growing cybersecurity threats of 2025, representing a sophisticated evolution…
A critical security vulnerability in smart bus systems has been discovered that enables hackers to remotely track vehicle locations and…
The Evolution of Exposure Management Most security teams have a good sense of what’s critical in their environment. What’s harder…
Critical cybersecurity vulnerabilities have been identified in enterprise-level Zero Trust Network Access solutions, potentially enabling malicious actors to breach corporate networks with…
In response to a detailed request for comment from WIRED, Palantir spokesperson Lisa Gordon said in a statement that the…
CastleLoader, a sophisticated malware loader, has compromised over 400 devices since its debut in early 2025, with cybersecurity firm PRODAFT…
North Korean hackers ScarCruft shift from spying to ransomware, using VCD malware in phishing attacks, targeting South Korea with advanced…
Xerox Corporation has issued urgent security updates addressing two high-impact vulnerabilities in its FreeFlow Core software. The flaws, now tracked…











