The global cybersecurity community is gearing up for Black Hat USA 2025, one of the industry’s most awaited events. The…
A flaw in Catwatchful spyware exposed logins of +62,000 users Pierluigi Paganini July 04, 2025 A flaw in Catwatchful spyware…
A sophisticated social engineering campaign has emerged targeting unsuspecting users through fraudulent Cloudflare verification screens, representing a new evolution in…
A major security lapse has exposed the credentials of over 62,000 users of Catwatchful, a full-featured Android spyware app that…
A dramatic surge in password spray attacks targeting enterprise infrastructure, with Cisco ASA VPN systems experiencing an unprecedented 399% increase…
Security researchers have disclosed two significant vulnerabilities in PHP, the popular server-side scripting language, that could allow attackers to launch…
A new credential-stealing malware, dubbed “123 | Stealer,” has surfaced on underground cybercrime forums, with the threat actor known as #koneko offering…
NTLM relay attacks are the easiest way for an attacker to compromise domain-joined hosts. While many security practitioners think NTLM…
To ensure resilience across the internet stack, organizations need to protect and manage four key areas: reachability, availability, reliability, and…
As major productivity solution providers continue to adjust their plan offerings, many organisations are grappling with sudden shrinking plan options,…
75% of organizations have building management systems (BMS) affected by known exploited vulnerabilities (KEVs), according to Claroty. Threats to building…
A sophisticated new botnet family has emerged in the cybersecurity landscape, demonstrating unprecedented innovation in malware design and attack methodologies….











