Cyber News

Danabot: Analyzing a fallen empire

ESET Research shares its findings on the workings of Danabot, an infostealer rec...

ViciousTrap Uses Cisco Flaw to Build Global Honeypot fr...

Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTr...

300 Servers and €3.5M Seized as Europol Strikes Ransomw...

As part of the latest "season" of Operation Endgame, a coalition of law enforcem...

SafeLine WAF: Open Source Web Application Firewall with...

From zero-day exploits to large-scale bot attacks — the demand for a powerful, s...

U.S. Dismantles DanaBot Malware Network, Charges 16 in ...

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the...

CISA Warns of Suspected Broader SaaS Attacks Exploiting...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday rev...

GitLab Duo Vulnerability Enabled Attackers to Hijack AI...

Cybersecurity researchers have discovered an indirect prompt injection flaw in G...

Critical Versa Concerto Flaws Let Attackers Escape Dock...

Cybersecurity researchers have uncovered multiple critical security vulnerabilit...

ESET takes part in global operation to disrupt Lumma St...

Our intense monitoring of tens of thousands of malicious samples helped this glo...

Chinese Hackers Exploit Trimble Cityworks Flaw to Infil...

A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the explo...

Critical Windows Server 2025 dMSA Vulnerability Enables...

A privilege escalation flaw has been demonstrated in Windows Server 2025 that ma...

Webinar: Learn How to Build a Reasonable and Legally De...

It’s not enough to be secure. In today’s legal climate, you need to prove it. Wh...

Identity Security Has an Automation Problem—And It's Bi...

For many organizations, identity security appears to be under control. On paper,...

Unpatched Versa Concerto Flaws Let Attackers Escape Doc...

Cybersecurity researchers have uncovered multiple critical security vulnerabilit...

FBI and Europol Disrupt Lumma Stealer Malware Network L...

A sprawling operation undertaken by global law enforcement agencies and a consor...

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Ente...

A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobi...