A cyber espionage campaign linked to China, known as APT24, has been utilizing a newly discovered malware named BadAudio over the course of a three-year operation....
SonicWall Urges Customers to Patch High-Severity SSLVPN Security Flaw Recent cybersecurity reports have highlighted a critical security flaw in SonicWall’s SonicOS SSLVPN service. The vulnerability, tracked...
Rollback of FCC Cybersecurity Standards Raises Concerns Following a major telecom hack in the US, the Federal Communications Commission (FCC) initially implemented strict cybersecurity standards for...
A recent discovery in the realm of Android threats is the emergence of a sophisticated banking trojan known as Sturnus. This malware has the capability to...
Security leaders are facing a monumental challenge: securing environments where failure is not an option. Relying on traditional security postures, such as Endpoint Detection and Response...
Sneaky2FA PhaaS Kit Enhances Browser-in-the-Browser Attack The Sneaky2FA phishing-as-a-service (PhaaS) kit has recently integrated browser-in-the-browser (BitB) capabilities, enabling attacks aimed at stealing Microsoft credentials and active...
Thousands of ASUS WRT routers, primarily older or outdated models, have fallen victim to a widespread cyber attack known as Operation WrtHug, which exploits six critical...
China-Linked Threat Actor ‘PlushDaemon’ Hijacking Software Update Traffic A cyberespionage operation conducted by a threat actor known as ‘PlushDaemon’ with ties to China has been uncovered....
ShadowRay 2.0: A Global Campaign Exploiting Ray Clusters for Crypto Mining In a new global campaign known as ShadowRay 2.0, cybercriminals are targeting exposed Ray Clusters...
Cloudflare’s Bot Controls and Recent Challenges Cloudflare offers bot controls to address issues such as web crawlers scraping data for generative AI training. Recently, they introduced...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.