Cyber News

Experts Warn of Widespread SonicWall VPN Compromise Imp...

Cybersecurity company Huntress on Friday warned of "widespread compromise" of So...

From LFI to RCE: Active Exploitation Detected in Gladin...

Cybersecurity company Huntress said it has observed active in-the-wild exploitat...

175 Malicious npm Packages with 26,000 Downloads Used i...

Cybersecurity researchers have flagged a new set of 175 malicious packages on th...

The AI SOC Stack of 2026: What Sets Top-Tier Platforms ...

The SOC of 2026 will no longer be a human-only battlefield. As organizations sca...

From Detection to Patch: Fortra Reveals Full Timeline o...

Fortra on Thursday revealed the results of its investigation into CVE-2025-10035...

Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS ...

A threat actor known as Storm-2657 has been observed hijacking employee accounts...

Stealit Malware Abuses Node.js Single Executable Featur...

Cybersecurity researchers have disclosed details of an active malware campaign c...

CL0P-Linked Hackers Breach Dozens of Organizations Thro...

Dozens of organizations may have been impacted following the zero-day exploitati...

From HealthKick to GOVERSHELL: The Evolution of UTA0388...

A China-aligned threat actor codenamed UTA0388 has been attributed to a series o...

SaaS Breaches Start with Tokens - What Security Teams M...

Token theft is a leading cause of SaaS breaches. Discover why OAuth and API toke...

ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B ...

Cyber threats are evolving faster than ever. Attackers now combine social engine...

Hackers Access SonicWall Cloud Firewall Backups, Spark ...

SonicWall on Wednesday disclosed that an unauthorized party accessed firewall co...

New ClayRat Spyware Targets Android Users via Fake What...

A rapidly evolving Android spyware campaign called ClayRat has targeted users in...

Critical Exploit Lets Hackers Bypass Authentication in ...

Threat actors are actively exploiting a critical security flaw impacting the Ser...

From Phishing to Malware: AI Becomes Russia's New Cyber...

Russian hackers' adoption of artificial intelligence (AI) in cyber attacks again...

Chinese Hackers Weaponize Open-Source Nezha Tool in New...

Threat actors with suspected ties to China have turned a legitimate open-source ...