Faster Vulnerability Patching Reduces Risk and Lowers Cyber Risk Index

Trend Micro’s Cyber Risk Exposure Management (CREM) solution has highlighted…

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four…

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!

A glaring vulnerability has come to light within Samsung’s One…

Malicious npm Packages Target Linux Developers with SSH Backdoor Attacks

In a sophisticated onslaught targeting the open-source ecosystem, reports have…

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

In what has been described as an "extremely sophisticated phishing…

Check Point Disputes Hacker’s Breach Claims

The security vendor counters that none of the information came…

SuperBlack Actors Exploiting Two Fortinet Vulnerabilities to Deploy Ransomware

Between late January and early March 2025, cybersecurity researchers at…

How To Detect Obfuscated Malware That Evades Static Analysis Tools

Obfuscated malware presents one of the most challenging threats in…

ChatGPT Image Generator Abused for Fake Passport Production

OpenAI’s ChatGPT image generator has been exploited to create convincing…

CISA Releases Five Industrial Control Systems Advisories Covering Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) released five Industrial…