Cyber News

WhatsApp Launches Private Processing to Enable AI Featu...

Popular messaging app WhatsApp on Tuesday unveiled a new technology called Priva...

How safe and secure is your iPhone really?

Your iPhone isn't necessarily as invulnerable to security threats as you may thi...

Malware Attack Targets World Uyghur Congress Leaders vi...

In a new campaign detected in March 2025, senior members of the World Uyghur Con...

CISA Adds Actively Exploited Broadcom and Commvault Fla...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added...

How Breaches Start: Breaking Down 5 Real Vulns

Not every security vulnerability is high risk on its own - but in the hands of a...

Earth Kurma Targets Southeast Asia With Rootkits and Cl...

Government and telecommunications sectors in Southeast Asia have become the targ...

WooCommerce Users Targeted by Fake Patch Phishing Campa...

Cybersecurity researchers are warning about a large-scale phishing campaign targ...

Hackers Exploit Critical Craft CMS Flaws; Hundreds of S...

Threat actors have been observed exploiting two newly disclosed critical securit...

⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phish...

What happens when cybercriminals no longer need deep skills to breach your defen...

Storm-1977 Hits Education Clouds with AzureChecker, Dep...

Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted...

Deepfake 'doctors' take to TikTok to peddle bogus cures

Look out for AI-generated 'TikDocs' who exploit the public's trust in the medica...

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomwar...

Cybersecurity researchers have detailed the activities of an initial access brok...

North Korean Hackers Spread Malware via Fake Crypto Fir...

North Korea-linked threat actors behind the Contagious Interview have set up fro...

New Critical SAP NetWeaver Flaw Exploited to Drop Web S...

Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to uplo...

Why NHIs Are Security's Most Dangerous Blind Spot

When we talk about identity in cybersecurity, most people think of usernames, pa...

Researchers Identify Rack::Static Vulnerability Enablin...

Cybersecurity researchers have disclosed three security flaws in the Rack Ruby w...