Trending Now
Cyber Security News
Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques
Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware has evolved with sophisticated PowerShell tools and advanced evasion tactics,...
New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms
Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as a lure.
Dubbed Noodlophile Stealer, this previously undocumented infostealer targets unsuspecting...
Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns
The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black Banshee,” has been active since at least 2012, targeting nations...
APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations
The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear phishing campaign targeting activists focused on North Korean issues.
Named "Operation:...
Open Source Linux Firewall IPFire 2.29 – Core Update 194 Released: What’s New!
IPFire, the powerful open-source firewall, has unveiled its latest release, IPFire 2.29 – Core Update 194, packed with security enhancements, performance improvements, and new...
Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft
Distributed Denial of Service (DDoS) attacks, once seen as crude tools for disruption wielded by script kiddies and hacktivists, have undergone a sophisticated transformation...
20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week
A 20-year-old criminal proxy network has been disrupted through a joint operation involving Lumen’s Black Lotus Labs, the U.S.
Department of Justice, the Federal Bureau...
Recent News
IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads
IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its Cognos Analytics platform.
These flaws, tracked as CVE-2024-40695 (Malicious File Upload) and CVE-2024-51466 (Expression Language...
Play Ransomware Deployed in the Wild Exploiting Windows 0-Day Vulnerability
Patched Windows zero-day vulnerability (CVE-2025-29824) in the Common Log File System (CLFS) driver was exploited in attacks linked to the Play ransomware operation prior...
Critical Azure and Power Apps Vulnerabilities Allow Attackers to Exploit RCE
Microsoft has patched four critical security vulnerabilities affecting its Azure cloud services and Power Apps platform that could allow attackers to escalate privileges, perform...
Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner
The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new modules, including a highly anticipated exploit targeting Erlang/OTP SSH servers...
Microsoft Teams to Safeguard Meetings by Blocking Screen Snaps
Microsoft has announced the upcoming release of a groundbreaking "Prevent Screen Capture" feature for Teams, designed to block unauthorized screenshots and recordings during virtual...
Cyberattackers Targeting IT Help Desks for Initial Breach
Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into granting access to critical systems, according to recent analyses by...
Hackers Target IT Admins by Poisoning SEO to Push Malware to Top Search Results
Cybercriminals are increasingly targeting IT administrators through sophisticated Search Engine Optimization (SEO) poisoning techniques.
By leveraging SEO tactics typically used for legitimate online marketing, attackers...
Nmap 7.96 Released with Enhanced Scanning Capabilities and Updated Libraries
The popular network mapping and security auditing tool Nmap has released version 7.96, featuring a host of significant improvements.
This latest version introduces parallel forward...
AI-Driven Fake Vulnerability Reports Flooding Bug Bounty Platforms
AI-generated bogus vulnerability reports, or "AI slop," are flooding bug bounty platforms, which is a worrying trend in the cybersecurity space.
These fraudulent submissions, crafted...
Most Popular
More
- Acquisition
- Adobe
- Adware
- AI
- Amazon
- Amazon AWS
- AMD
- Android
- Anti Virus
- Antimalware
- Antispoofing
- ANY RUN
- Apache
- Apple
- APT
- Artificial Intelligence
- Avast
- AWS
- Azure
- Backdoor
- Bitcoin
- Bluetooth
- Botnet
- Browser
- Buffer over flow
- Bug Bounty
- Business
- ChatGPT
- Checklist
- Chrome
- Cisco
- CISO
- CISO Advisory
- Cloud
- Cloud Security
- Cloudflare
- Computer Security
- Course
- CPU
- Cross site Scripting
- cryptocurrency
- Cryptocurrency hack
- CVE/vulnerability
- Cyber Advisory
- Cyber AI
- Cyber Attack
- Cyber Crime
- cyber security
- Cyber security Course
- Cyber Security News
- Cyber Security Resources
- Dark Web
- Data Breach
- Data Governance
- DDOS
- Deals
- DeepSeek
- DNS
- Dos Attack
- Drive
- Dropbox
- Education
- Email Security
- Exploit
- Exploitation Tools
- Extratorrents
- Featured
- Firefox
- Firefox News
- Firewall
- Forensics Tools
- game
- GitHub
- Gmail
- Google dorks
- Governance
- GRC
- Hacking Books
- Hacks
- Hardware Hacking
- HBO
- HTML
- HTTP
- IIS
- Incident Response
- Information Gathering
- Information Security Risks
- Infosec- Resources
- Insider Threats
- Intel
- Internet
- iOS
- IoT
- ISO
- IT
- JavaScript
- KALI