Microsoft is experimenting with ad-supported versions of its Office desktop apps, allowing users to edit documents with restricted functionality. Unlike [...]
The Chinese APT group "Mustang Panda," also known as Earth Preta, has been abusing Microsoft's Application Virtualization Injector (MAVInject.exe) to [...]
Google Chrome has upgraded its "Enhanced Protection" feature with AI to provide real-time security against malicious websites, downloads, and extensions. [...]
Security researchers from Rapid7 revealed that attackers used a previously unknown PostgreSQL vulnerability (CVE-2025-1094) as a zero-day to exploit BeyondTrust’s [...]
Security researchers at DataDog uncovered a vulnerability called "whoAMI," which lets attackers gain code execution in AWS accounts by publishing [...]
Hackers are increasingly targeting unpatched systems vulnerable to older security flaws, specifically CVE-2022-47945 in ThinkPHP and CVE-2023-49103 in ownCloud. The [...]
Cisco has released fixes for two critical vulnerabilities (CVE-2025-20124 and CVE-2025-20125) in its Identity Services Engine (ISE) platform, a widely [...]
A Chinese cyber-espionage group, Evasive Panda (also known as DaggerFly), has been using a newly discovered SSH backdoor, "ELF/Sshdinjector.A!tr," to [...]
As part of its November security updates, Google patched two Android zero-day vulnerabilities, CVE-2024-43047 and CVE-2024-43093, both actively exploited in [...]
Google's Threat Intelligence Group (GTIG) has identified government-backed APT groups from over 20 countries, including Iran, China, North Korea, and [...]
Akamai researchers have identified Aquabotv3, a new variant of the Mirai-based botnet malware, exploiting the CVE-2024-41710 vulnerability in Mitel SIP [...]
A high-severity vulnerability in 7-Zip (CVE-2025-0411) allowed attackers to bypass Windows' Mark of the Web (MotW) security mechanism, enabling the [...]
Hewlett Packard Enterprise (HPE) is probing allegations by threat actor IntelBroker, who claims to have accessed the company’s developer environments [...]
A new vulnerability, CVE-2024-7344, has been discovered in UEFI Secure Boot, affecting Microsoft-signed applications in third-party system recovery tools. The [...]
A fraudulent proof-of-concept (PoC) exploit for the LDAPNightmare vulnerability (CVE-2024-49113) has been circulating on GitHub, secretly deploying infostealer malware that [...]
Cybercriminals are exploiting CVE-2024-52875, a critical CRLF injection flaw in GFI KerioControl firewalls, to execute remote code and steal sensitive [...]
A new Mirai-based botnet is actively targeting vulnerabilities in DigiEver DS-2105 Pro NVRs and outdated TP-Link routers, exploiting a previously [...]