OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws

A second security flaw impacting the OttoKit (formerly SureTriggers) WordPress…

Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

Europol has announced the takedown of distributed denial of service…

Infrastructure as Code: An IaC Guide to Cloud Security

IaC is powerful. It brings speed, scale, and structure to…

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been…

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April…

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious…

New Sophisticated Malware CoffeeLoader Bypasses Endpoint Security to Deploy Rhadamanthys Shellcode

Cybersecurity researchers have uncovered a sophisticated new malware strain targeting…

Protecting Against Insider Threats – Strategies for CISOs

Insider threats represent a critical vulnerability in organizational cybersecurity, posing…

North Korean IT Workers Using GitHub To Attack Organization Globally

Cybersecurity research firm NISOS has uncovered a network of suspected…

CISA Adds 2 VeraCore Vulnerabilities to Known Actively Exploit Vulnerability Catalog

CISA has likely added two VeraCore vulnerabilities, CVE-2024-57968 and CVE-2025-25181,…

xAI Dev Leaks API Key for Private SpaceX, Tesla LLMs

An employee at Elon Musk’s artificial intelligence company xAI leaked a private key on GitHub that for the past two months could have allowed anyone to […]