cyberpress
Cyber Security News
Google Introduces End-to-End Encryption for Gmail Business Users
Google has unveiled end-to-end encryption (E2EE) capabilities for Gmail enterprise users, simplifying encrypted email communication for businesses of all sizes.This feature, launched in beta...
Botnet
New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time
A persistent Linux malware known as "Outlaw" has been identified leveraging unsophisticated yet effective techniques to maintain a long-running botnet.Despite its lack of...
Browser
Hackers Exploit JavaScript & CSS Tricks to Steal Browsing History
The web browsing history feature, designed to enhance user convenience by styling visited links differently, has inadvertently created a privacy vulnerability.Hackers have exploited this...
Cyber Security News
Python Introduces New Standard Lock File Format for Enhanced Security
The Python Software Foundation (PSF) has officially announced the adoption of a new standardized lock file format, outlined in PEP 751.This development is a major...
Cyber Security News
Hackers Exploit Microsoft Teams Messages to Deliver Malware
Cybersecurity experts have uncovered a new malware campaign targeting Microsoft Teams users to infiltrate corporate systems.By exploiting the platform’s communication vulnerabilities and leveraging malicious...
CVE/vulnerability
Hackers Exploiting Vulnerabilities in SonicWall, Zoho, F5 & Ivanti Systems
A surge in cyber activity targeting critical edge technologies and management tools, including SonicWall, Zoho, F5, Ivanti, and other systems, has been flagged by...
CVE/vulnerability
CISA Alerts on Active Exploitation of Apache Tomcat Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert regarding the active exploitation of CVE-2025-24813, a critical vulnerability within Apache Tomcat.This...
Cyber Attack
Sliver Framework Customized Enhances Evasion and Bypasses EDR Detection
The Sliver Command & Control (C2) framework, an open-source tool written in Go, has been a popular choice for offensive security practitioners since its...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.