Latest Articles
Top 10 Best Dynamic Application Security Testing (DAST) Platforms in 2025
Dynamic Application Security Testing (DAST) platforms are critical tools for modern enterprise security teams to identify vulnerabilities in web applications during runtime.
As organizations...
Cyber Extortion Campaign in August Hits More Than One Hundred Organizations
Qilin ransomware group maintained its position as the most active operator for the fourth consecutive month, claiming responsibility for 104 victim organizations in August...
Everest Ransomware Group Accused of Stealing BMW Internal Files
The Everest ransomware group has claimed responsibility for exfiltrating approximately 600,000 lines of sensitive internal documents from Bayerische Motoren Werke AG (BMW), constituting one...
Emerging Shinysp1d3r Ransomware as a Service Threatens VMware ESXi Infrastructure
ShinyHunters, the financially motivated eCrime syndicate notorious for large-scale data extortion, has expanded its tactics in 2025 to include AI-enabled voice phishing, supply chain...
SonicWall Tells Customers to Change Passwords After MySonicWall Backup Files Leak
SonicWall has urged all customers to immediately reset administrative and user passwords across their firewall environments after threat actors obtained sensitive configuration backups from...
Massive Phishing Scam Preys on Facebook Accounts for Credentials
Security researchers at MailMarshal SpiderLabs have uncovered a sophisticated phishing campaign that exploits Facebook’s external URL warning system to bypass user suspicion and harvest...
Splunk Detects and Prevents Remote Employment Fraud Across Large Distributed Workforces Worldwide
Cybersecurity platform Splunk has released comprehensive detection methodologies to identify Remote Employment Fraud (REF) actors who successfully infiltrate organizations through legitimate hiring processes.
The...
Top 10 Best MCP (Model Context Protocol) Servers in 2025
In 2025, the rapid rise of AI-driven applications, agent-based workflows, and large language models has pushed Model Context Protocol (MCP) servers to the forefront...
New investigation uncovers sophisticated Warlock ransomware campaign
Counter Threat Unit™ researchers have identified a sophisticated cybercriminal operation targeting organizations worldwide through an advanced ransomware campaign.
The threat group, known internally as...
Hidden WPS Flaw Exposes Router PINs and Enables Network Intrusion
In a startling revelation, researchers at NetRise have uncovered that the Pixie Dust exploit a Wi-Fi Protected Setup (WPS) vulnerability first disclosed in 2014...