Cyber News

TamperedChef Malware Spreads via Fake Software Installe...

Threat actors are leveraging bogus installers masquerading as popular software t...

Iran-Linked Hackers Mapped Ship AIS Data Days Before Re...

Threat actors with ties to Iran engaged in cyber warfare as part of efforts to f...

New Sturnus Android Trojan Quietly Captures Encrypted C...

Cybersecurity researchers have disclosed details of a new Android banking trojan...

CTM360 Exposes a Global WhatsApp Hijacking Campaign: Ha...

CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targ...

Python-Based WhatsApp Worm Spreads Eternidade Stealer A...

Cybersecurity researchers have disclosed details of a new campaign that leverage...

Hackers Actively Exploiting 7-Zip Symbolic Link–Based R...

A recently disclosed security flaw impacting 7-Zip has come under active exploit...

ServiceNow AI Agents Can Be Tricked Into Acting Against...

Malicious actors can exploit default configurations in ServiceNow's Now Assist g...

EdgeStepper Implant Reroutes DNS Queries to Deploy Malw...

The threat actor known as PlushDaemon has been observed using a previously undoc...

Application Containment: How to Use Ringfencing to Prev...

The challenge facing security leaders is monumental: Securing environments where...

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Th...

A newly discovered campaign has compromised tens of thousands of outdated or end...

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerabi...

Fortinet has warned of a new security flaw in FortiWeb that it said has been exp...

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to M...

The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as...

Seven npm Packages Use Adspect Cloaking to Trick Victim...

Cybersecurity researchers have discovered a set of seven npm packages published ...

Beyond IAM Silos: Why the Identity Security Fabric is E...

Identity security fabric (ISF) is a unified architectural framework that brings ...

Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in A...

Suspected espionage-driven threat actors from Iran have been observed deploying ...

Researchers Detail Tuoni C2's Role in an Attempted 2025...

Cybersecurity researchers have disclosed details of a cyber attack targeting a m...