Cyber News

Zimbra Zero-Day Exploited to Target Brazilian Military ...

A now patched security vulnerability in Zimbra Collaboration was exploited as a ...

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScap...

The cyber world never hits pause, and staying alert matters more than ever. Ever...

5 Critical Questions For Adopting an AI Security Solution

In the era of rapidly advancing artificial intelligence (AI) and cloud technolog...

Oracle Rushes Patch for CVE-2025-61882 After Cl0p Explo...

Oracle has released an emergency update to address a critical security flaw in i...

CometJacking: One Click Can Turn Perplexity’s Comet AI ...

Cybersecurity researchers have disclosed details of a new attack called CometJac...

Scanning Activity on Palo Alto Networks Portals Jump 50...

Threat intelligence firm GreyNoise disclosed on Friday that it has observed a sp...

Rhadamanthys Stealer Evolves: Adds Device Fingerprintin...

The threat actor behind Rhadamanthys has also advertised two other tools called ...

Detour Dog Caught Running DNS-Powered Malware Factory f...

A threat actor named Detour Dog has been outed as powering campaigns distributin...

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively E...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday add...

New "Cavalry Werewolf" Attack Hits Russian Agencies wit...

A threat actor that's known to share overlaps with a hacking group called YoroTr...

Product Walkthrough: How Passwork 7 Addresses Complexit...

Passwork is positioned as an on-premises unified platform for both password and ...

Researchers Warn of Self-Spreading WhatsApp Malware Nam...

Brazilian users have emerged as the target of a new self-propagating malware tha...

How to Close Threat Detection Gaps: Your SOC's Action Plan

Running a SOC often feels like drowning in alerts. Every morning, dashboards lig...

Google Mandiant Probes New Oracle Extortion Wave Possib...

Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that ...

ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQ...

From unpatched cars to hijacked clouds, this week’s Threatsday headlines remind ...

Automating Pentest Delivery: 7 Key Workflows for Maximu...

Penetration testing is critical to uncovering real-world security weaknesses. Wi...