Microsoft warns of ClickFix campaign exploiting Windows Terminal to deliver Lumma Stealer

2 months ago

Microsoft warns of ClickFix campaign using Windows Terminal to deliver Lumma Stealer via social engineering attacks. Microsoft revealed a new…

Iran-nexus APT Dust Specter targets Iraq officials with new malware

2 months ago

A campaign by Iran-linked group Dust Specter is targeting Iraqi officials with phishing emails delivering new malware families. Zscaler ThreatLabz…

U.S. CISA adds Apple, Rockwell, and Hikvision  flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display: none; background-color: transparent;"></gwmw>

2 months ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple, Rockwell, and Hikvision flaws to its Known Exploited Vulnerabilities catalog. The U.S.…

Google GTIG: 90 zero-day flaws exploited in 2025 as enterprise targets grow

2 months ago

Google’s GTIG reports 90 zero-day vulnerabilities exploited in the wild in 2025, up from 78 in 2024, with a growing…

Phobos Ransomware admin faces up to 20 years after guilty plea

2 months ago

Russian national Evgenii Ptitsyn (43) pleaded guilty in the U.S. for his role in the Phobos ransomware operation. Russian national…

Russian APT targets Ukraine with BadPaw and MeowMeow malware

2 months ago

Researchers uncovered a Russian campaign targeting Ukrainian entities with new malware families BadPaw and MeowMeow delivered through phishing emails. Researchers…

Operation Leak: FBI and Europol dismantle LeakBase Cybercrime forum

2 months ago

The Federal Bureau of Investigation seized the LeakBase cybercrime forum in an international crackdown led by Europol. The Federal Bureau…

Google uncovers Coruna iOS Exploit Kit targeting iOS 13–17.2.1

2 months ago

Google warns of the Coruna iOS exploit kit, using 23 exploits across five chains to target iPhones running iOS 13–17.2.1,…

Cisco fixes maximum-severity Secure FMC bugs threatening firewall security

2 months ago

Cisco patched two critical Secure FMC vulnerabilities that could let attackers gain root access to managed firewalls. Cisco addressed two…

Automate or orchestrate? Implementing a streamlined remediation program to shorten MTTR

2 months ago

Security teams want lower MTTR, but flaws persist. How to use automation vs. orchestration to reduce risk effectively? Almost all…

This website uses cookies.