Next-Gen Developers Are a Cybersecurity Powder Keg

AI coding tools promise productivity but deliver security problems, too.…

New Blitz Malware Targets Windows Servers to Deploy Monero Miner

A new Windows-based malware named Blitz has been identified in…

APT41 Hackers Leverage Google Calendar for Malware C2 in Attacks on Government Entities

The Chinese state-sponsored threat actor APT41, also known as BARIUM,…

U.S. Targets $7.7M in Crypto Tied to North Korean IT Worker Scam

On June 5, 2025, the United States Department of Justice…

Meta Bypassed Privacy Protections to Track Android Users

A recent investigation by cybersecurity researchers has revealed that tech…

New Crocodilus Malware Grants Full Control Over Android Devices

The Mobile Threat Intelligence (MTI) team identified a formidable new…

Critical Fortinet Vulnerability Draws Fresh Attention

CISA this week added CVE-2025-24472 to its catalog of known…

Mozilla Quickly Fixes Firefox Vulnerabilities from Pwn2Own 2025 with Urgent Patches

At this year’s Pwn2Own Berlin, security researchers successfully demonstrated two…

GNU C(glibc) Vulnerability Let Attackers Execute Arbitrary Code on Millions of Linux Systems

Security researchers have disclosed a significant vulnerability in the GNU…

Critical Denodo Scheduler Flaw Allows Remote Code Execution by Attackers

Denodo, a provider of logical data management software, recently faced…

Appsmith Developer Tool Vulnerability Let Attackers Execute Remote Code

Security researchers have uncovered multiple critical vulnerabilities in Appsmith, a popular open-source developer platform for building internal applications.  Most concerning is CVE-2024-55963, which allows unauthenticated […]