Latest Articles
Trellix Introduces Phishing Simulator to Strengthen Organization Defense Against Attacks
Trellix has announced the launch of Trellix Phishing Simulator, an advanced platform designed to empower organizations in the fight against phishing attacks by proactively...
AiTM Phishing Kits Defeat MFA by Stealing Credentials and Authentication Tokens
Security analysts at Darktrace's Security Operations Center (SOC) have identified a sophisticated phishing campaign utilizing Adversary-in-the-Middle (AiTM) tactics to compromise Software-as-a-Service (SaaS) accounts, bypassing...
Nitrogen Ransomware Deploys Cobalt Strike and Destroys Logs in Attacks on Organizations
Threat actors using the Nitrogen ransomware have amplified their operational sophistication by deploying Cobalt Strike payloads and systematically erasing forensic evidence from targeted enterprise...
Researchers Expose Threat Actor TTPs and DNS Manipulation Behind Investment Scams
The Federal Trade Commission (FTC) reported that consumer losses to investment scams reached a staggering $5.7 billion, climbing 24% from the previous year.
Cybersecurity researchers...
Low-Privilege Code Execution Risk Found in Cato Networks Client for macOS
A critical security flaw (CVE-2025-3886) in Cato Networks’ macOS Client has been disclosed, enabling local attackers to escalate privileges and execute arbitrary code with...
Hackers Deceive Tenants into Redirecting Rent Payments to Fraudulent Accounts
A newly identified financially motivated threat actor, tracked as TA2900 by Proofpoint, has launched a series of business email compromise (BEC) campaigns targeting tenants...
New WordPress Anti-Malware Plugin Grants Hackers Full Website Control
A newly discovered malware variant, camouflaged as a seemingly legitimate WordPress anti-malware plugin, has been granting threat actors full administrative control over targeted websites,...
Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions
Security researchers have disclosed a series of high-risk vulnerabilities in Microsoft Telnet Server, specifically targeting the NTLM authentication mechanism within the Microsoft Telnet Authentication...
Ruby on Rails Flaw Enables Bypass of CSRF Protections
A longstanding vulnerability in Ruby on Rails’ cross-site request forgery (CSRF) protections has resurfaced, as security researchers have demonstrated that all current versions, as...
Critical Flaw in SonicWALL Connect Tunnel Enables DoS Attacks
A newly disclosed security flaw, tracked as CVE-2025-32817, has been identified in the SonicWall Connect Tunnel Windows Client, potentially exposing organizations to unauthorized file...