Cyber News

Apple Backports Fix for CVE-2025-43300 Exploited in Sop...

Apple on Monday backported fixes for a recently patched security flaw that has b...

New FileFix Variant Delivers StealC Malware Through Mul...

Cybersecurity researchers have warned of a new campaign that's leveraging a vari...

SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2...

A massive ad fraud and click fraud operation dubbed SlopAds ran a cluster of 224...

40 npm Packages Compromised in Supply Chain Attack Usin...

Cybersecurity researchers have flagged a fresh software supply chain attack targ...

Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory ...

A team of academics from ETH Zürich and Google has discovered a new variant of a...

Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yok...

The China-aligned threat actor known as Mustang Panda has been observed using an...

HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages ...

Chinese-speaking users are the target of a search engine optimization (SEO) pois...

AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI D...

A new artificial intelligence (AI)-powered penetration testing tool linked to a ...

⚡ Weekly Recap: Bootkit Malware, AI-Powered Attacks, S...

In a world where threats are persistent, the modern CISO’s real job isn't just t...

6 Browser-Based Attacks Security Teams Need to Prepare ...

Attacks that target users in their web browsers have seen an unprecedented rise ...

Introducing HybridPetya: Petya/NotPetya copycat with UE...

UEFI copycat of Petya/NotPetya exploiting CVE-2024-7344 discovered on VirusTotal

FBI Warns of UNC6040 and UNC6395 Targeting Salesforce P...

The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to relea...

Apple Warns French Users of Fourth Spyware Campaign in ...

Apple has notified users in France of a spyware campaign targeting their devices...

Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploite...

Samsung has released its monthly security updates for Android, including a fix f...

Are cybercriminals hacking your systems – or just loggi...

As bad actors often simply waltz through companies’ digital front doors with a k...

Cloud-Native Security in 2025: Why Runtime Visibility M...

The security landscape for cloud-native applications is undergoing a profound tr...