Microsoft Purges Millions of Cloud Tenants in Wake of Storm-0558

The tech giant is boosting Entra ID and MSA security…

3 More Healthcare Orgs Hit by Ransomware Attacks

Dialysis firm DaVita, Wisconsin-based Bell Ambulance, and Alabama Ophthalmology Associates…

City of Abilene Goes Offline in Wake of Cyberattack

The Texas municipality is following its incident response playbook as…

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Cybersecurity researchers have detailed a malware campaign that's targeting Docker…

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported…

Uncategorized

The Intersection of Generative AI and Cybersecurity

Generative AI, AI, Cybersecurity  The digital landscape is rapidly evolving,…

Hackers Leveraging DNS MX Records To Dynamically Create Fake Logins Mimic as 100+ Brands

A sophisticated phishing operation has emerged that creatively leverages DNS…

Sapphire Werewolf Enhances Toolkit With New Amethyst Stealer to Attack Energy Companies

Cybersecurity experts have detected a sophisticated campaign targeting energy sector…

Cybercriminals Exploit Google OAuth Loophole to Evade Gmail Security

A sophisticated phishing attack exploiting a loophole in Google’s OAuth…

Critical Flaw in PHP’s extract() Function Enables Arbitrary Code Execution

A critical vulnerability in PHP’s extract() function has been uncovered, enabling attackers…