Cybersecurity researchers at Varonis Threat Labs have uncovered a persistent vulnerability that has remained unaddressed for over a decade, allowing attackers to exploit browser handling […]
Raven Stealer Targets Google Chrome Users to Exfiltrate Sensitive Data
Raven Stealer, a sophisticated information-stealing malware that has been wreaking havoc on users’ sensitive data. This contemporary malware represents a concerning evolution in credential theft […]
Google Chrome 0-Day Under Active Attack – Update Immediately
Google has released an urgent security update for Chrome browser users worldwide, addressing four critical vulnerabilities, including one zero-day exploit that is currently being actively […]
Warning: Brute force attacks hitting SonicWall firewall configuration backups
SonicWall is warning admins that recent brute force attacks on its firewall’s API service for cloud backup could have exposed backup configuration files stored in […]
Check Point acquires Lakera to build a unified AI security stack
Check Point has signed an agreement to acquire Lakera, an AI-native security platform specializing in agentic AI applications. Expected to close in Q4 2025 for […]
Microsoft Disrupts ‘RaccoonO365’ Phishing Service
Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who want to get into cybercrime. ​The original article found on darkreading Read […]
TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks
The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans (RATs) like Venom RAT to […]
‘Scattered Lapsus$ Hunters,’ Others Announce End of Hacking Spree
Though the groups have shared their decision to go dark, threat researchers say there are signs that it’s business as usual. ​The original article found […]
New in Syteca Release 7.21: Agentless Access, Sensitive Data Masking, and Smooth Session Playback
Syteca, a global cybersecurity provider, introduced the latest release of its platform, continuing the mission to help organizations reduce insider risks and ensure sensitive data […]
CISSP certification: Requirements, training, exam, and cost
CISSP certification: Requirements, training, exam, and cost The Certified Information Systems Security Professional ‘gold standard’ certification demonstrates your skills, testifies to your experience, and opens […]