Oracle Corporation has released a sweeping Critical Patch Update (CPU) for April 2025, addressing a staggering 378 security vulnerabilities across a wide array of its […]
Hackers Exploit Node.js to Spread Malware and Exfiltrate Data
Threat actors are increasingly targeting Node.js—a staple tool for modern web developers—to launch sophisticated malware campaigns aimed at data theft and system compromise. Microsoft Defender […]
U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert
The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities and Exposures (CVE) program will expire Wednesday, an unprecedented […]
Authorities Shut Down Four Encrypted Platforms Used by Cybercriminals
Law enforcement authorities across Europe and Türkiye have dealt a major blow to four criminal networks alleged to be at the heart of drug trafficking […]
Critical Chrome Vulnerability Exposes Users to Data Theft and Unauthorized Access
A critical security vulnerability has been discovered in Google Chrome, prompting an urgent update as millions of users worldwide face potential threats of data theft […]
Zeek Deployments Rise Across SOCs For Enhanced Network Visibility
Zeek, formerly known as Bro, has established itself as a leading open-source network security monitoring platform. As organizations face increasingly complex cyber threats in 2025, […]
Protecting Against Insider Threats – Strategies for CISOs
Insider threats represent a critical vulnerability in organizational cybersecurity, posing risks that are often more challenging to mitigate than external attacks. These threats can originate […]
MITRE Ends CVE Program Support – Leaked Internal Memo Confirms Departure
A leaked internal memo dated April 15, 2025, has sent shockwaves through the cybersecurity community, revealing that MITRE’s contract to operate the Common Vulnerabilities and […]
Funding Expires for Key Cyber Vulnerability Database
A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware is in danger of breaking […]
AI-Powered Presentation Tool Leveraged in Phishing Attacks
Researchers at Abnormal Security said threat actors are using a legitimate presentation and graphic design tool named “Gamma” in phishing attacks. The original article found […]