
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 118 articles
Phishing Attacks Now Verify Your Email Before Stealing Credentials
A sophisticated phishing campaign is making it harder to spot scams, with attackers now checking if your email address...
Read More
AI-Powered Cyberattacks Demand a Rapid Security Response
The cybersecurity landscape is transforming at breakneck speed, thanks to artificial intelligence. Malicious actors are...
Read More
Suspected Pakistan-Backed Hackers Hit India with New CurlBack RAT
Indian organizations are under renewed assault from a threat group believed to be operating out of Pakistan. Security...
Read More
Fortinet Devices Still Vulnerable After Patching, Hackers Retain Access
Even after applying security updates, some Fortinet FortiGate devices remain susceptible to attack, according to a new...
Read More
Paper Werewolf APT Hunts Russian Targets with Stealthy PowerModul Malware
A hacking group dubbed Paper Werewolf is exclusively targeting Russian organizations with a newly discovered implant...
Read More
Palo Alto Networks Under Siege Brute-Force Attacks Target GlobalProtect Gateways
Palo Alto Networks is battling a wave of brute-force login attempts aimed at its PAN-OS GlobalProtect gateways. The...
Read More
Fake App Campaign Spreads SpyNote, BadBazaar, and MOONSHINE Malware to Android and iOS
Android and iOS users are under attack from a sophisticated malware campaign using fake apps, cybersecurity experts...
Read More
Play Praetor Campaign Explodes CTM360 Reveals Massive Expansion
The Play Praetor campaign, initially flagged by CTM360 for targeting banks via roughly 6,000 URLs, has ballooned...
Read More