Ransomware Gang Exploiting ISPsystem VMs for Covert Payload Delivery Amidst recent ‘WantToCry’ ransomware incidents, cybersecurity experts at Sophos have uncovered a concerning trend. Ransomware operators are...
Chinese-Speaking Threat Actors Suspected in Targeting VMware ESXi with Compromised SonicWall VPN Appliance Recent cybersecurity findings suggest that threat actors fluent in Chinese may have utilized...
Following the disclosure of a critical vulnerability affecting React and Next.js, multiple threat actors linked to China wasted no time in exploiting the React2Shell flaw (CVE-2025-55182)....
Google Chrome Security Update Addresses Seventh Zero-Day Vulnerability Google Chrome has recently rolled out an emergency security update to fix the seventh zero-day vulnerability that has...
North Korean threat actors are exploiting Google’s Find Hub feature to monitor the GPS coordinates of their targets and remotely restore Android devices to their factory...
Russian Hackers Exploit Hyper-V to Conceal Malware in Linux VMs A cyber-espionage group known as Curly COMrades has been identified for leveraging Microsoft Hyper-V within Windows...
It’s 3:37 am on a Sunday in Los Angeles, and one of the leading financial services firms on the West Coast is experiencing the second week...
Recent reports from the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed that a critical privilege escalation vulnerability in the Linux kernel is currently being exploited...
The cybercriminal group Qilin, also known as Agenda, Gold Feather, and Water Galura, has been responsible for over 40 attacks per month since the beginning of...
Microsoft Attributes Medusa Ransomware Deployment to Storm-1175 Group Exploiting Fortra GoAnywhere Vulnerability On Monday, Microsoft revealed that the Storm-1175 threat actor group exploited a critical security...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.