Cyber News

Hackers Exploit Critical CrushFTP Flaw to Gain Admin Ac...

A newly disclosed critical security flaw in CrushFTP has come under active explo...

China's Massistant Tool Secretly Extracts SMS, GPS Data...

Cybersecurity researchers have shed light on a mobile forensics tool called Mass...

UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK...

Multiple sectors in China, Hong Kong, and Pakistan have become the target of a t...

Ivanti Zero-Days Exploited to Drop MDifyLoader and Laun...

Cybersecurity researchers have disclosed details of a new malware called MDifyLo...

CERT-UA Discovers LAMEHUG Malware Linked to APT28, Usin...

The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details ...

Critical NVIDIA Container Toolkit Flaw Allows Privilege...

Cybersecurity researchers have disclosed a critical container escape vulnerabili...

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet ...

Google on Thursday revealed it's pursuing legal action in New York federal court...

From Backup to Cyber Resilience: Why IT Leaders Must Re...

With IT outages and disruptions escalating, IT teams are shifting their focus be...

Hackers Use GitHub Repositories to Host Amadey Malware ...

Threat actors are leveraging public GitHub repositories to host malicious payloa...

Europol Disrupts NoName057(16) Hacktivist Group Linked ...

An international operation coordinated by Europol has disrupted the infrastructu...

CTEM vs ASM vs Vulnerability Management: What Security ...

The modern-day threat landscape requires enterprise security teams to think and ...

Chinese Hackers Target Taiwan's Semiconductor Sector wi...

The Taiwanese semiconductor industry has become the target of spear-phishing cam...

Hackers Exploit Apache HTTP Server Flaw to Deploy Linux...

Cybersecurity researchers have discovered a new campaign that exploits a known s...

Cisco Warns of Critical ISE Flaw Allowing Unauthenticat...

Cisco has disclosed a new maximum-severity security vulnerability impacting Iden...

Unmasking AsyncRAT: Navigating the labyrinth of forks

ESET researchers map out the labyrinthine relationships among the vast hierarchy...

Hackers Leverage Microsoft Teams to Spread Matanbuchus ...

Cybersecurity researchers have flagged a new variant of a known malware loader c...