Latest Articles

Best Dynamic Application Security Testing (DAST) Platforms

Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2025

Dynamic Application Security Testing (DAST) platforms are critical tools for modern enterprise security teams to identify vulnerabilities in web applications during runtime. As organizations...
Cyber Extortion Campaign

Cyber Extortion Campaign in August Hits More Than One Hundred Organizations

Qilin ransomware group maintained its position as the most active operator for the fourth consecutive month, claiming responsibility for 104 victim organizations in August...
Everest Ransomware

Everest Ransomware Group Accused of Stealing BMW Internal Files

The Everest ransomware group has claimed responsibility for exfiltrating approximately 600,000 lines of sensitive internal documents from Bayerische Motoren Werke AG (BMW), constituting one...
Shinysp1d3r Ransomware

Emerging Shinysp1d3r Ransomware as a Service Threatens VMware ESXi Infrastructure

ShinyHunters, the financially motivated eCrime syndicate notorious for large-scale data extortion, has expanded its tactics in 2025 to include AI-enabled voice phishing, supply chain...
SonicWall backup files leak

SonicWall Tells Customers to Change Passwords After MySonicWall Backup Files Leak

SonicWall has urged all customers to immediately reset administrative and user passwords across their firewall environments after threat actors obtained sensitive configuration backups from...
Facebook Phishing Scam

Massive Phishing Scam Preys on Facebook Accounts for Credentials

Security researchers at MailMarshal SpiderLabs have uncovered a sophisticated phishing campaign that exploits Facebook’s external URL warning system to bypass user suspicion and harvest...
Remote Employment Fraud

Splunk Detects and Prevents Remote Employment Fraud Across Large Distributed Workforces Worldwide

Cybersecurity platform Splunk has released comprehensive detection methodologies to identify Remote Employment Fraud (REF) actors who successfully infiltrate organizations through legitimate hiring processes. The...
Best MCP (Model Context Protocol) Servers

Top 10 Best MCP (Model Context Protocol) Servers in 2025

In 2025, the rapid rise of AI-driven applications, agent-based workflows, and large language models has pushed Model Context Protocol (MCP) servers to the forefront...
Warlock ransomware campaign

New investigation uncovers sophisticated Warlock ransomware campaign

Counter Threat Unit™ researchers have identified a sophisticated cybercriminal operation targeting organizations worldwide through an advanced ransomware campaign. The threat group, known internally as...
WPS vulnerability

Hidden WPS Flaw Exposes Router PINs and Enables Network Intrusion

In a startling revelation, researchers at NetRise have uncovered that the Pixie Dust exploit a Wi-Fi Protected Setup (WPS) vulnerability first disclosed in 2014...

Cyber Security Headlines

Cyber Attacks

Over 40K Attacks Exploit APIs to Smuggle Malicious Code

The first half of 2025 has marked a sharp escalation in API-focused threats, according to a new data-driven...

CrowdStrike npm Packages Compromised Amid Ongoing Supply Chain Attack

The discovery of a fresh supply chain attack targeting npm packages maintained by the CrowdStrike-publisher account marks a...

Data Breach

FinWise Insider Breach Exposes 700,000 Customer Records to Former Employee

American First Finance, LLC, doing business as FinWise, has confirmed that an insider breach exposed the personal information of approximately 689,000 customers...

Cyber AI