Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported…

‘Cookie Bite’ Entra ID Attack Exposes Microsoft 365

A proof-of-concept (PoC) attack vector exploits two Azure authentication tokens…

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of…

DeepSeek Breach Opens Floodgates to Dark Web

The incident should serve as a critical wake-up call. The…

GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud…

Managing Burnout in the SOC – What CISOs Can Do

The Security Operations Center (SOC) is the nerve center of…

With AI’s Help, Bad Bots Are Taking Over the Web

Bad bots are becoming increasingly difficult to detect as they…

Windows CLFS Zero-Day Vulnerability Actively Exploited by Ransomware Group

A critical zero-day vulnerability in the Windows Common Log File…

Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware

Ivanti has disclosed details of a now-patched critical security vulnerability…

FCC Investigates China-Backed Tech Suppliers for Evading US Operations Ban

FCC chairman warns these companies may still be operating in…