Cyber News

CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Ac...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday adde...

A Cybercrime Merger Like No Other — Scattered Spider, L...

The nascent collective that combines three prominent cybercrime groups, Scattere...

Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor...

Threat actors are leveraging weaponized attachments distributed via phishing ema...

Ransomware Defense Using the Wazuh Open Source Platform

Ransomware is malicious software designed to block access to a computer system o...

Critical React Native CLI Flaw Exposed Millions of Deve...

Details have emerged about a now-patched critical security flaw in the popular "...

Microsoft Teams Bugs Let Attackers Impersonate Colleagu...

Cybersecurity researchers have disclosed details of four security flaws in Micro...

Europol and Eurojust Dismantle €600 Million Crypto Frau...

Nine people have been arrested in connection with a coordinated law enforcement ...

Microsoft Detects "SesameOp" Backdoor Using OpenAI's AP...

Microsoft has disclosed details of a novel backdoor dubbed SesameOp that uses Op...

Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in ...

Google's artificial intelligence (AI)-powered cybersecurity agent called Big Sle...

U.S. Prosecutors Indict Cybersecurity Insiders Accused ...

Federal prosecutors in the U.S. have accused a trio of allegedly hacking the net...

Cybercriminals Exploit Remote Monitoring Tools to Infil...

Bad actors are increasingly training their sights on trucking and logistics comp...

Malicious VSX Extension "SleepyDuck" Uses Ethereum to K...

Cybersecurity researchers have flagged a new malicious extension in the Open VSX...

Cybersecurity Awareness Month 2025: Building resilience...

Ransomware rages on and no organization is too small to be targeted by cyber-ext...

Gotta fly: Lazarus targets the UAV sector

ESET research analyzes a recent instance of the Operation DreamJob cyberespionag...

SnakeStealer: How it preys on personal data – and how y...

Here’s what to know about the malware with an insatiable appetite for valuable d...

Cybersecurity Awareness Month 2025: Cyber-risk thrives ...

Shadow IT leaves organizations exposed to cyberattacks and raises the risk of da...