The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded Meteobridge to its Known Exploited Vulnerabilities (KEV) catalog, ...
Google Mandiant tracks FIN11’s high-volume extortion emails exploiting Oracle E-Business Suite, possibly linked to Cl0p.
The ProSpy campaign, discovered in June 2025, is believed to have been ongoing since 2024, leveraging deceptive websites masquerading as Signal and ToTok to host booby-trapped APK files that claim to ...
From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is ...
Malicious PyPI package soopsocks downloaded 2,653 times before takedown, exfiltrating Windows data to Discord.
Confucius hackers target Pakistan with WooperStealer and Anondoor malware using phishing and DLL side-loading.
Automated workflows accelerate pentest delivery, cut delays, and ensure real-time vulnerability remediation visibility.
SGX is designed as a hardware feature in Intel server processors that allows applications to be run in a Trusted Execution ...
CVE-2025-59363 "allowed attackers with valid API credentials to enumerate and retrieve client secrets for all OIDC applications within an organization's OneLogin tenant," Clutch Security said in a ...
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT.
Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign ...
AI-only workflows risk fragility and compliance issues—learn secure, explainable automation in this Tines webinar.