Cybercriminals are increasingly exploiting legitimate Windows driver signing processes to deploy sophisticated kernel-level malware, with new research revealing a concerning…
Microsoft has announced a significant change for Windows 11 users: the removal of Windows PowerShell 2.0, a legacy scripting platform,…
Security researchers from the Socket Threat Research Team have uncovered a sophisticated network of eight malicious Firefox browser extensions that…
Two critical vulnerabilities in ScriptCase’s Production Environment module can be chained together to achieve pre-authenticated remote command execution on affected…
A newly published proof-of-concept (PoC) for the critical CitrixBleed 2 vulnerability (CVE-2025-5777) has sent shockwaves through the cybersecurity community, with…
A sophisticated APT group dubbed “NightEagle” (APT-Q-95) has been conducting targeted attacks against China’s critical technology sectors since 2023. The…
A newly highlighted vulnerability in the Linux boot process exposes a critical weakness in the security posture of many modern…
A series of malicious apps and stealthy spyware is targeting Android users worldwide, with new data showing how cybercriminals keep…
U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini July 07, 2025 U.S. Cybersecurity…
A new tool named RingReaper is raising eyebrows among defenders and red teamers alike. By leveraging the legitimate, high-performance Linux…
Researchers from the University of Pretoria presented a new technique for detecting tampering in PDF documents by analyzing the file’s…
July 3, 2025 – The “El Chapo” Mexican drug cartel snooped on FBI personnel through hacked cameras, and listened in…











