Instagram Started Using 1-Week Validity TLS certificates and Changes Them Daily
05
Jul
2025

Instagram Started Using 1-Week Validity TLS certificates and Changes Them Daily

Instagram has adopted an unprecedented approach to web security by implementing daily rotation of TLS certificates that maintain validity periods…

"CitrixBleed 2" Vulnerability PoC Released
05
Jul
2025

“CitrixBleed 2” Vulnerability PoC Released

Critical flaw in Citrix NetScaler devices echoes infamous 2023 security breach that crippled major organizations worldwide. The new critical vulnerability…

Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
05
Jul
2025

Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure

Russian Federal Security Service (FSB) officers have detained two hackers in Siberia who conducted cyberattacks on critical infrastructure facilities under…

Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone
05
Jul
2025

Threat Actors Turning Job Offers Into Traps, Over $264 Million Lost in 2024 Alone

Cybercriminals are exploiting the economic uncertainty and remote work trends to orchestrate sophisticated employment fraud schemes, with victims losing over…

The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses
05
Jul
2025

The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses

XWorm has emerged as one of the most versatile and actively distributed remote access trojans in the current threat landscape,…

How Digital Executive Protection Shields Top Leaders from Modern Threats
05
Jul
2025

How Digital Executive Protection Shields Top Leaders from Modern Threats

Cybersecurity threats have emerged so quickly that most companies struggle to keep up and executives are often the first targets….

Threat Actors Abused AV - EDR Evasion Framework In-The-Wild to Deploy Malware Payloads
05
Jul
2025

Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads

Cybersecurity researchers have uncovered a concerning development as malicious actors began exploiting SHELLTER, a commercial anti-virus and endpoint detection response…

Android May Soon Warn You About Fake Cell Towers
05
Jul
2025

Android May Soon Warn You About Fake Cell Towers

In recent years, North Korea has deployed thousands of so-called IT workers to infiltrate Western businesses, get paid salaries, and…

Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence
05
Jul
2025

Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence

The cybercriminal group known as Scattered Spider has significantly evolved its attack methodologies, demonstrating alarming sophistication in exploiting legitimate administrative…

Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle
05
Jul
2025

Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle

Cybercriminals have increasingly turned to legitimate software installation frameworks as vehicles for malware distribution, with Inno Setup emerging as a…

Why you should never pay to get paid
05
Jul
2025

Why you should never pay to get paid

Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played…

Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence
05
Jul
2025

Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence

Cybersecurity researchers have discovered a sophisticated attack technique that exploits Microsoft Azure Arc deployments to gain persistent access to enterprise…