THREATS

This section has all the newest information on a wide range of threats, such as online threats, physical security risks, and new threats. Keep up with the latest changes in attacks, weaknesses, and possible dangers in a variety of areas. Our coverage gives you an idea of how these threats are changing and what you can do to lessen their effects.

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA pages to deliver the Lumma Stealer…

22 hours ago

Salt Typhoon Hacked Nine U.S. Telecoms, Tactics and Techniques Revealed

Salt Typhoon, a state-sponsored Advanced Persistent Threat (APT) group linked to the People's Republic of China (PRC), has executed one…

23 hours ago

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular open-source framework Next.js, demonstrating how improper…

2 days ago

Hackers Exploiting Fortinet Zero-day Vulnerability In Wild To Gain Super-Admin Privileges

A critical zero-day vulnerability in Fortinet's FortiOS and FortiProxy products is being actively exploited by hackers to gain super-admin privileges…

1 week ago

Critical SAP NetWeaver Flaws Let Hackers Gain System Access

SAP has released its January 2025 Security Patch Day updates, addressing 14 new vulnerabilities, including two critical flaws in SAP…

1 week ago

Microsoft January 2025 Patch Tuesday Comes with Fix for 159 Vulnerabilities

Microsoft's January 2025 Patch Tuesday has arrived with a significant security update, addressing a total of 159 vulnerabilities. This marks…

1 week ago

Chrome Security Update – Patch For 16 Vulnerabilities

Google has released a significant security update for its Chrome browser, addressing 16 vulnerabilities in version 132.0.6834.83/84 for Windows, Mac,…

1 week ago

Hackers Exploiting YouTube to Spread Malware That Steals Browser Data

Malware actors leverage popular platforms like YouTube and social media to distribute fake installers. Reputable file hosting services are abused…

2 weeks ago

EAGERBEE Malware Updated It’s Arsenal With Payloads & Command Shells

The Kaspersky researchers investigation into the EAGERBEE backdoor revealed its deployment within Middle Eastern ISPs and government entities of novel…

3 weeks ago

New Watering Hole Attack That Used Fake Adobe Flash Player Update To Deliver Malware

Cybersecurity threats are increasingly targeting vulnerabilities in publicly exposed assets like VPNs and firewalls, exploited by various actors, including APT…

1 month ago