Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Cybersecurity researchers have detailed a malware campaign that's targeting Docker…

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported…

‘Cookie Bite’ Entra ID Attack Exposes Microsoft 365

A proof-of-concept (PoC) attack vector exploits two Azure authentication tokens…

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of…

DeepSeek Breach Opens Floodgates to Dark Web

The incident should serve as a critical wake-up call. The…

Hertz Falls Victim to Cleo Zero-Day Attacks

Customer data such as birth dates, credit card numbers and…

10 Best Email Security Solutions in 2025

Email security solutions are critical for protecting organizations from the…

Critical Vulnerabilities in DrayTek Routers Exposes Devices to RCE Attack

A series of critical vulnerabilities in DrayTek Vigor routers widely…

Positiv denken für Sicherheitsentscheider: 6 Mindsets, die Sie sofort ablegen sollten

In einem falschen Security-Mindset gefangen? Foto: Paul Craft – shutterstock.com…

Supply Chain Security: The Starbucks and Grocery Store Ransomware Attack

The recent ransomware attack targeting Blue Yonder, a key software…