Cybersecurity WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately by Cyber Security August 11, 2025 1.3k
Cybersecurity Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models August 10, 2025 1.3k
Cybersecurity Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install August 9, 2025 1.3k
Cybersecurity UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud August 9, 2025 1.3k
Cybersecurity Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies August 9, 2025 1.3k
Cybersecurity Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code June 3, 2025 1.3k
Cybersecurity Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets June 3, 2025 1.3k
Cybersecurity Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion June 3, 2025 1.3k
Cybersecurity New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch June 3, 2025 1.3k
Cybersecurity Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU June 2, 2025 1.3k
Cybersecurity New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora May 31, 2025 1.3k
Cybersecurity Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack May 28, 2025 1.3k
Cybersecurity Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File May 28, 2025 1.3k
Cybersecurity 251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch May 28, 2025 1.3k
Cybersecurity Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats May 28, 2025 1.3k
Cybersecurity New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency May 27, 2025 1.3k
Cybersecurity Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents May 27, 2025 1.3k
Cybersecurity ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices May 23, 2025 1.3k
Cybersecurity CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs May 23, 2025 1.3k
Cybersecurity Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks May 22, 2025 1.3k
Cybersecurity Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise May 22, 2025 1.3k
Cybersecurity Identity Security Has an Automation Problem—And It’s Bigger Than You Think May 22, 2025 1.3k
Cybersecurity Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host May 22, 2025 1.3k
Cybersecurity Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program May 22, 2025 1.3k
Cybersecurity PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms May 21, 2025 1.3k
Cybersecurity Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager May 21, 2025 1.3k
Cybersecurity AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation May 20, 2025 1.3k
Cybersecurity South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware May 20, 2025 1.3k