Cybersecurity researchers at ETH Zurich have disclosed a critical new Spectre-based attack called VMSCAPE that exploits incomplete branch predictor isolation in virtualized cloud environments. The attack, tracked […]
Daikin Security Gateway Vulnerability Allows Unauthorized System Access
A critical security flaw in Daikin Security Gateway systems has been discovered that could enable attackers to bypass authentication and gain unauthorized access to industrial […]
VirtualBox 7.2.2 Update Released with Fix for Guest GUI Crashes
Oracle has released VirtualBox 7.2.2, a critical maintenance update that addresses multiple GUI crashes and stability issues affecting users across Windows, Linux, and macOS platforms. […]
New ToneShell Variant Uses Task Scheduler COM Service to Maintain Persistence
The latest ToneShell variant introduces a notable advancement in its persistence strategy by leveraging the Windows Task Scheduler COM service. This lightweight backdoor, traditionally delivered […]
Ransomware gang going after improperly patched SonicWall firewalls
Vulnerable SonicWall firewalls that should have been patched a year ago for an access control vulnerability are being hacked by a ransomware gang, Australia’s cybersecurity authorities warned […]
Top 10 Best Mobile Application Penetration Testing Services in 2025
Mobile Application Penetration Testing is a critical cybersecurity service in 2025, focusing on a unique and rapidly evolving attack surface. These tests go beyond static […]
Vyro AI Leak Reveals Poor Cyber Hygiene
The data leak underscores the larger issue of proprietary or sensitive data being shared with GenAI by users who should know better. ​The original article […]
‘Gentlemen’ Ransomware Abuses Vulnerable Driver to Kill Security Gear
By weaponizing the ThrottleStop.sys driver, attackers are disrupting antivirus and endpoint detection and response (EDR) systems. ​The original article found on darkreading Read More
AI-Enhanced Malware Sports Super-Stealthy Tactics
With legit sounding names, EvilAI’s “productivity” apps are reviving classic threats like Trojans while adding new evasion capabilities against modern antivirus defenses. ​The original article […]
Top 10 Best Cloud Penetration Testing Companies in 2025
Cloud is the foundation of modern business, but it comes with a complex and evolving security landscape. Traditional penetration testing, which focuses on on-premise networks […]