Cyber News

How CISOs Can Drive Effective AI Governance

AI’s growing role in enterprise environments has heightened the urgency for Chie...

SilentSync RAT Delivered via Two Malicious PyPI Package...

Cybersecurity researchers have discovered two new malicious packages in the Pyth...

CountLoader Broadens Russian Ransomware Operations With...

Cybersecurity researchers have discovered a new malware loader codenamed CountLo...

SonicWall Urges Password Resets After Cloud Backup Brea...

SonicWall is urging customers to reset credentials after their firewall configur...

Google Patches Chrome Zero-Day CVE-2025-10585 as Active...

Google on Wednesday released security updates for the Chrome web browser to addr...

Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S...

A China-aligned threat actor known as TA415 has been attributed to spear-phishin...

TA558 Uses AI-Generated Scripts to Deploy Venom RAT in ...

The threat actor known as TA558 has been attributed to a fresh set of attacks de...

HybridPetya: The Petya/NotPetya copycat comes with a twist

HybridPetya is the fourth publicly known real or proof-of-concept bootkit with U...

Scattered Spider Resurfaces With Financial Sector Attac...

Cybersecurity researchers have tied a fresh round of cyber attacks targeting fin...

Rethinking AI Data Security: A Buyer's Guide 

Generative AI has gone from a curiosity to a cornerstone of enterprise productiv...

From Quantum Hacks to AI Defenses – Expert Guide to Bui...

Quantum computing and AI working together will bring incredible opportunities. T...

RaccoonO365 Phishing Network Dismantled as Microsoft, C...

Microsoft's Digital Crimes Unit said it teamed up with Cloudflare to coordinate ...

DOJ Resentences BreachForums Founder to 3 Years for Cyb...

The U.S. Department of Justice (DoJ) on Tuesday resentenced the former administr...

Self-Replicating Worm Hits 180+ npm Packages to Steal C...

Cybersecurity researchers have flagged a fresh software supply chain attack targ...

Chaos Mesh Critical GraphQL Flaws Enable RCE and Full K...

Cybersecurity researchers have disclosed multiple critical security vulnerabilit...

Securing the Agentic Era: Introducing Astrix's AI Agent...

AI agents are rapidly becoming a core part of the enterprise, being embedded acr...