Latest Articles

Phishing Simulator

Trellix Introduces Phishing Simulator to Strengthen Organization Defense Against Attacks

Trellix has announced the launch of Trellix Phishing Simulator, an advanced platform designed to empower organizations in the fight against phishing attacks by proactively...
AiTM Phishing Kits Defeat MFA

AiTM Phishing Kits Defeat MFA by Stealing Credentials and Authentication Tokens

Security analysts at Darktrace's Security Operations Center (SOC) have identified a sophisticated phishing campaign utilizing Adversary-in-the-Middle (AiTM) tactics to compromise Software-as-a-Service (SaaS) accounts, bypassing...
Nitrogen Ransomware

Nitrogen Ransomware Deploys Cobalt Strike and Destroys Logs in Attacks on Organizations

Threat actors using the Nitrogen ransomware have amplified their operational sophistication by deploying Cobalt Strike payloads and systematically erasing forensic evidence from targeted enterprise...
Investment Scams

Researchers Expose Threat Actor TTPs and DNS Manipulation Behind Investment Scams

The Federal Trade Commission (FTC) reported that consumer losses to investment scams reached a staggering $5.7 billion, climbing 24% from the previous year. Cybersecurity researchers...

Low-Privilege Code Execution Risk Found in Cato Networks Client for macOS

A critical security flaw (CVE-2025-3886) in Cato Networks’ macOS Client has been disclosed, enabling local attackers to escalate privileges and execute arbitrary code with...
Fraudulent Accounts

Hackers Deceive Tenants into Redirecting Rent Payments to Fraudulent Accounts

A newly identified financially motivated threat actor, tracked as TA2900 by Proofpoint, has launched a series of business email compromise (BEC) campaigns targeting tenants...
Anti-Malware Plugin

New WordPress Anti-Malware Plugin Grants Hackers Full Website Control

A newly discovered malware variant, camouflaged as a seemingly legitimate WordPress anti-malware plugin, has been granting threat actors full administrative control over targeted websites,...

Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions

Security researchers have disclosed a series of high-risk vulnerabilities in Microsoft Telnet Server, specifically targeting the NTLM authentication mechanism within the Microsoft Telnet Authentication...
Rails Flaw

Ruby on Rails Flaw Enables Bypass of CSRF Protections

A longstanding vulnerability in Ruby on Rails’ cross-site request forgery (CSRF) protections has resurfaced, as security researchers have demonstrated that all current versions, as...

Critical Flaw in SonicWALL Connect Tunnel Enables DoS Attacks

A newly disclosed security flaw, tracked as CVE-2025-32817, has been identified in the SonicWall Connect Tunnel Windows Client, potentially exposing organizations to unauthorized file...

Cyber Security Headlines

Cyber Attacks

Trellix Introduces Phishing Simulator to Strengthen Organization Defense Against Attacks

Trellix has announced the launch of Trellix Phishing Simulator, an advanced platform designed to empower organizations in the...

AiTM Phishing Kits Defeat MFA by Stealing Credentials and Authentication Tokens

Security analysts at Darktrace's Security Operations Center (SOC) have identified a sophisticated phishing campaign utilizing Adversary-in-the-Middle (AiTM) tactics...

Data Breach

China-Backed Hackers Breach Enterprise Systems and High-Profile Targets

U.S.-based cybersecurity firm SentinelOne disclosed an escalating series of attacks targeting its infrastructure and those of its clients, confirming that the world’s...

Cyber AI

New AI-Powered Mirai Botnet Unleashes Unstoppable Large-Scale DDoS Attacks

The Mirai botnet is actively exploiting known web vulnerabilities to compromise over 1,200 sites across 780 customer accounts, as researchers have identified...