Flax Typhoon APT exploited ArcGIS server for over a year as a backdoor

4 months ago

China-linked cyberespionage group Flax Typhoon hijacked an ArcGIS system for over a year and used it as a backdoor. China-linked…

Researchers warn of widespread RDP attacks by 100K-node botnet

4 months ago

A botnet of 100K+ IPs from multiple countries is attacking U.S. RDP services in a campaign active since October 8.…

Harvard University hit in Oracle EBS cyberattack, 1.3 TB of data leaked by Cl0p group

4 months ago

Harvard University confirmed being targeted in the Oracle EBS campaign after the Cl0p ransomware group leaked 1.3 TB of data.…

UK NCSC Reports 429 cyberattacks in a year, with nationally significant cases more than doubling

4 months ago

The UK’s NCSC handled 429 cyberattacks from Sept 2024–Aug 2025, including 204 nationally significant cases, over double the previous year’s…

Unverified COTS hardware enables persistent attacks in small satellites via SpyChain<gwmw style="display:none;"></gwmw>

4 months ago

SpyChain shows how unverified COTS hardware in small satellites can enable persistent, multi-component supply chain attacks using NASA’s NOS3 simulator.…

Oracle issued an emergency security update to fix new E-Business Suite flaw CVE-2025-61884

4 months ago

Oracle issued an emergency security update to address a new E-Business Suite (EBS) vulnerability tracked as CVE-2025-61884. Oracle released an emergency…

Customer payment data stolen in Unity Technologies’s SpeedTree website compromise

4 months ago

Malicious code on Unity Technologies’s SpeedTree site skimmed sensitive data from hundreds of customers, the company confirmed. Video game software…

SimonMed Imaging discloses a data breach impacting over 1.2 million people<gwmw style="display:none;"></gwmw>

4 months ago

Medusa ransomware hit SimonMed Imaging, stealing 200 GB of data and impacting over 1.2 million people in a major healthcare…

Microsoft revamps Internet Explorer Mode in Edge after August attacks

4 months ago

Microsoft updated Edge’s Internet Explorer mode after August 2025 reports that attackers exploited it to access users’ devices without authorization.…

Astaroth Trojan abuses GitHub to host configs and evade takedowns<gwmw style="display: none; background-color: transparent;"></gwmw>

4 months ago

The Astaroth banking Trojan uses GitHub to host malware configs, evade C2 takedowns and stay active by pulling new settings…

This website uses cookies.