Microsoft paid a record $17 million this year to 344 security researchers across 59 countries through its bug bounty program….
Security researchers have uncovered a highly advanced network of Chinese-speaking cybercriminal syndicates orchestrating smishing attacks that exploit digital wallet tokenization,…
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks carried out by a threat actor called…
The UK’s Ministry of Defence (MoD) has selected Australian cyber scaleup Castlepoint Systems to run its data environment and prevent…
Google has released its latest Android Security Bulletin for August 2025, addressing multiple vulnerabilities across the Android ecosystem. Among the…
Cybercriminals are increasingly exploiting Remote Monitoring and Management (RMM) software to gain unauthorized access to corporate systems, with a sophisticated…
Trend Micro has issued an urgent security bulletin warning customers of critical remote code execution vulnerabilities in its Apex One…
Critical command injection remote code execution (RCE) vulnerabilities in Trend Micro Apex One Management Console are currently being actively exploited…
The Cybersecurity and Infrastructure Security Agency (CISA) has escalated its campaign to protect U.S. networks by adding three newly exploited…
Google fixed two Qualcomm bugs that were actively exploited in the wild Pierluigi Paganini August 06, 2025 Google addressed multiple…
Adversaries are using Remote Monitoring and Management (RMM) tools more frequently as dual-purpose weapons for initial access and persistence in…
Aug 06, 2025Ravie LakshmananVulnerability / Firmware Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three old…











