
Trending Tags
Featured Posts
Today’s Stories
-
Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector
Read More: Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services SectorThe cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend for global businesses. According to a recent analysis by Check Point Research, ransomware incidents surged…
Latest Articles
-
Ghost Ransomware Targets Organizations Across 70+ Countries
Read More: Ghost Ransomware Targets Organizations Across 70+ CountriesA new ransomware variant known as “Ghost” (also referred to as Cring) has emerged as a significant danger. Since its first appearance in 2021, the FBI and CISA have…
-
China Plans Expanded Cybersecurity Cooperation with Russia
Read More: China Plans Expanded Cybersecurity Cooperation with RussiaChina has announced a significant step forward in its partnership with Russia, with plans to expand their cooperation in the field of cybersecurity. In an article published by Sputnik…
-
Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords
Read More: Blockchain Offers Security Benefits – But Don’t Neglect Your PasswordsBlockchain is best known for its use in cryptocurrencies like Bitcoin, but it also holds significant applications for online authentication. As businesses in varying sectors increasingly embrace blockchain-based security…
-
Critical Erlang/OTP SSH Vulnerability Allow Hackers Execute Arbitrary Code Remotely
Read More: Critical Erlang/OTP SSH Vulnerability Allow Hackers Execute Arbitrary Code RemotelyA major security flaw has been uncovered in the widely used Erlang/OTP SSH implementation, drawing urgent attention from the cybersecurity community worldwide. The vulnerability, tracked as CVE-2025-32433, exposes systems to…
-
Harvest Ransomware Attack: Stolen Data Now Publicly Disclosed
Read More: Harvest Ransomware Attack: Stolen Data Now Publicly DisclosedFrench fintech leader Harvest SAS has become the latest high-profile victim of a sophisticated ransomware attack, culminating this week in the public release of a trove of sensitive stolen data. The…
-
Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers
Read More: Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView InstallersMicrosoft is calling attention to an ongoing malvertising campaign that makes use of Node.js to deliver malicious payloads capable of information theft and data exfiltration. The activity, first detected…
-
Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution
Read More: Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code ExecutionA critical security vulnerability has been disclosed in the Erlang/Open Telecom Platform (OTP) SSH implementation that could permit an attacker to execute arbitrary code sans any authentication under certain…
-
Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking Tools
Read More: Chinese Hacker Group Mustang Panda Bypass EDR Detection With New Hacking ToolsThe China-sponsored hacking group, Mustang Panda, has been uncovered by Zscaler ThreatLabz to employ new techniques and tools, including the updated backdoor ToneShell and a novel tool named StarProxy,…
-
CISA Warns of Potential Credential Exploits Linked to Oracle Cloud Hack
Read More: CISA Warns of Potential Credential Exploits Linked to Oracle Cloud HackThe Cybersecurity and Infrastructure Security Agency (CISA) has issued a public warning following reports of possible unauthorized access to a legacy Oracle Cloud environment. While the full scope and…
-
Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution
Read More: Critical Flaw in PHP’s extract() Function Enables Arbitrary Code ExecutionA critical vulnerability in PHP’s extract() function has been uncovered, enabling attackers to execute arbitrary code by exploiting memory corruption flaws. The issue affects PHP versions 5.x, 7.x, and 8.x, allowing…