Cyber News

CL-STA-0969 Installs Covert Malware in Telecom Networks...

Telecommunications organizations in Southeast Asia have been targeted by a state...

Is your phone spying on you? | Unlocked 403 cybersecuri...

Here's what you need to know about the inner workings of modern spyware and how ...

Why the tech industry needs to stand firm on preserving...

Restricting end-to-end encryption on a single-country basis would not only be ab...

Akira Ransomware Exploits SonicWall VPNs in Likely Zero...

SonicWall SSL VPN devices have become the target of Akira ransomware attacks as ...

Attackers Use Fake OAuth Apps with Tycoon Kit to Breach...

Cybersecurity researchers have detailed a new cluster of activity where threat a...

Cursor AI Code Editor Fixed Flaw Allowing Attackers to ...

Cybersecurity researchers have disclosed a now-patched, high-severity security f...

This month in security with Tony Anscombe – July 2025 e...

Here's a look at cybersecurity stories that moved the needle, raised the alarm, ...

AI-Generated Malicious npm Package Drains Solana Funds ...

Cybersecurity researchers have flagged a malicious npm package that was generate...

You Are What You Eat: Why Your AI Security Tools Are On...

Just as triathletes know that peak performance requires more than expensive gear...

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock a...

The threat actor linked to the exploitation of the recently disclosed security f...

Secret Blizzard Deploys Malware in ISP-Level AitM Attac...

The Russian nation-state threat actor known as Secret Blizzard has been observed...

Experts Detect Multi-Layer Redirect Tactic Used to Stea...

Cybersecurity researchers have disclosed details of a new phishing campaign that...

N. Korean Hackers Used Job Lures, Cloud Account Access,...

The North Korea-linked threat actor known as UNC4899 has been attributed to atta...

AI-Driven Trends in Endpoint Security: What the 2025 Ga...

Cyber threats and attacks like ransomware continue to increase in volume and com...

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries...

The financially motivated threat actor known as UNC2891 has been observed target...

Alert Fatigue, Data Overload, and the Fall of Tradition...

Security Operations Centers (SOCs) are stretched to their limits. Log volumes ar...