News

52% of breaches stem from manual identity workflows in disconnected apps—causing customer loss and compliance risks.
A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation of a now-patched ...
Microsoft and Europol dismantled Lumma’s 2,300-domain C2 network after 10M infections tied to credential and crypto theft.
UNC5221 exploited Ivanti EPMM flaws CVE-2025-4427/4428 in global attacks starting May 15, 2025, enabling remote access and ...
APT28 targets NATO-aligned logistics and tech firms via malware, phishing, and 7 CVEs to spy on Ukraine aid routes.
Three critical Versa Concerto flaws disclosed after 90 days allow remote code execution via reverse proxy misconfigurations.
The attack chains leverage spear-phishing lures as a starting point to activate the infection process and deploy a known ...
Fake Facebook ads impersonating Kling AI deploy PureHVNC RAT via spoofed sites, stealing credentials and crypto data.
The original executable that launches "ckcfb.exe" simultaneously also extracts a second binary referred to as "StilKrip.exe," ...
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed ...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web ...
Google has launched a new Chrome feature that automatically updates compromised passwords using its built-in Password Manager ...