In 2025, Google’s Threat Intelligence Group (GTIG) monitored and recorded 90 instances of zero-day vulnerabilities being actively exploited, with nearly half of them targeting enterprise software...
Cisco has identified two new security vulnerabilities in Catalyst SD-WAN Manager that are actively being exploited, prompting administrators to update vulnerable devices for enhanced protection. Catalyst...
The Rise of AI-Powered Cybersecurity Tools in 2026 In the realm of cybersecurity, researchers have uncovered a concerning development involving a newly discovered open-source AI security...
The United Kingdom on High Alert for Iranian Cyberattacks Amidst escalating tensions in the Middle East, the National Cyber Security Centre (NCSC) in the United Kingdom...
OpenClaw Vulnerability “ClawJacked” Exposed by Oasis Security Recently, security researchers at Oasis Security unveiled a significant vulnerability in the popular AI agent OpenClaw, named “ClawJacked.” This...
Employee accounts are increasingly targeted in cyber-attacks, with one in three incidents involving compromised credentials. To better assess cyber risk, insurers and regulators now focus on...
Suspected Chinese State-Backed Hackers Exploit Critical Dell Security Flaw A critical Dell security flaw has been quietly exploited by a suspected Chinese state-backed hacking group in...
Keeping your personal information secure on your iPhone is crucial. From personal notes to bank apps, your device holds a lot of sensitive data that, if...
State-Sponsored Hackers Exploiting AI for Cyberattacks Government-backed hackers from countries like Iran, North Korea, China, and Russia are leveraging artificial intelligence to enhance cyberattacks. According to...
Reports indicate that state-sponsored hackers have been utilizing Google’s Gemini AI model at various stages of cyber attacks, ranging from initial reconnaissance to post-compromise activities. Hackers...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.