A new Android banking trojan named Sturnus can capture communication from end-to-end encrypted messaging platforms like Signal, WhatsApp, and Telegram, as…
A severe vulnerability in Ollama, one of GitHub’s most popular open-source projects, with over 155,000 stars. The flaw enables attackers…
Aging digital infrastructure equipment like routers, network switches, and network-attached storage—has long posed a silent risk to organizations. In the…
The distinction between cyber warfare and traditional military operations is disappearing. Recent investigations by Amazon threat intelligence teams have identified…
Bedrock Data announced Bedrock Data ArgusAI and Natural Language Policy. ArgusAI is a new product that expands the company’s capabilities…
The National Security Agency (NSA), in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and multiple international…
Generative artificial intelligence has fundamentally transformed the landscape of cybercriminal operations by eliminating what was once a critical barrier to…
ID-Pal has announced a major enhancement to its document-fraud detection feature, ID-Detect, delivering even more powerful defences against AI-generated digital…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert about a zero-day vulnerability in Google Chrome,…
Twonky Server version 8.5.2 contains two critical authentication bypass vulnerabilities that allow unauthenticated attackers to steal administrator credentials and take…
Minimus announced the general availability of Image Creator, a new feature that empowers customers to build their own hardened container…
Nov 20, 2025Ravie LakshmananCyber Warfare / Threat Intelligence Threat actors with ties to Iran engaged in cyber warfare as part…