Google Patches Actively Exploited Chrome 0-Day — Google has addressed a high-severity security flaw in its Chrome browser for ...
Applications hosted in AWS are still vulnerable to attacks like SSRF, where attackers trick a server into making requests on ...
"The file names use Russian words related to the movement of troops in Ukraine as a lure," Cisco Talos researcher Guilherme ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been ...
Although AI will inevitably be used by attackers to improve the quality and enhance the pace of their attacks, there are proactive measures we can take to scale our defenses. Zero trust and smart ...
The Crocodilus artifacts analyzed by the Dutch mobile security company masquerade as Google Chrome (package name: ...
VMware Tools flaw CVE-2025-22230 enables high-privilege actions on Windows VMs + No workaround + Patch in 12.5.1.
BlackLock's misconfigured leak site exposed internal commands, aiding Resecurity in uncovering 46 ransomware victims.
An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the creation of a fake website masquerading as India's public sector postal system as part of a campaign designed ...
Hackers have long used Word and Excel documents as delivery vehicles for malware, and in 2025, these tricks are far from outdated. From phishing schemes to zero-click exploits, malicious Office files ...
Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, ...