A new cyber threat campaign dubbed JSCEAL has been uncovered by Check Point Research, targeting cryptocurrency users through deceptive advertisements [...]
A hacker group has been exploiting trusted link-wrapping services from companies like Proofpoint and Intermedia to conceal phishing links targeting [...]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has publicly launched Thorium, an open-source platform designed to support malware analysis [...]
Microsoft has linked Chinese state-backed groups, Linen Typhoon and Violet Typhoon, to widespread attacks exploiting SharePoint vulnerabilities (CVE-2025-49706, CVE-2025-49704, and [...]
Cybersecurity experts have identified a new malware, MDifyLoader, used in attacks targeting Ivanti Connect Secure (ICS) appliances by exploiting two [...]
Cybercriminals are leveraging ConnectWise ScreenConnect installers to spread remote access malware by manipulating hidden configuration data embedded in the file’s [...]
Ivanti has issued security patches for three serious vulnerabilities in its Workspace Control (IWC) platform, which stem from hardcoded cryptographic [...]
Two harmful npm packages, ‘express-api-sync’ and ‘system-health-sync-api’, have been uncovered posing as helpful utilities while secretly containing code to wipe [...]
Two severe security flaws in vBulletin, identified as CVE-2025-48827 and CVE-2025-48828, are being actively exploited, with one enabling remote code [...]
The DragonForce ransomware group recently infiltrated a managed service provider (MSP) and leveraged its SimpleHelp remote monitoring platform to access [...]
A collaborative international operation has significantly disrupted the Lumma malware-as-a-service (MaaS) scheme, taking control of around 2,300 domains used by [...]