Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious activities, including leveraging the compromised […]
Apple Intelligence Is Picking Up More User Data Than Expected, Researcher Finds
Music tastes, location information, even encrypted messages — Apple’s servers are gathering a “surprising” amount of personal data through Apple Intelligence, Lumia Security’s Yoav Magid […]
ReVault Flaw Exposed Millions of Dell Laptops to Malicious Domination
A bug in the control board that connects peripheral devices in commonly used Dell laptops allowed malicious access all the way down to the firmware […]
Silk Typhoon Attacks North American Orgs in the Cloud
A Chinese APT is going where most APTs don’t: deep into the cloud, compromising supply chains and deploying uncommon malware. ​The original article found on […]
Interpol Arrests Over 1K Cybercriminals in ‘Operation Serengeti 2.0’
The operation disrupted countless scams, and authorities seized a significant amount of evidence and recovered nearly $100 million in lost funds. ​The original article found […]
Agentic AI vs SOAR: What’s the Real Difference?
By now, you’ve heard the hype. Agentic AI; self-directed and goal-oriented. Supposedly, the next big thing in security automation. If you’re working in a Security Operations […]
Disgruntled developer gets four-year sentence for revenge attack on employer’s network
A software developer who launched disruptive logic bombs inside his employer’s network as an act of revenge has been sentenced to four years in prison […]
Hackers Hijack VPS Servers to Breach Software-as-a-Service Accounts
Virtual Private Servers (VPS) have long served as versatile tools for developers and businesses, offering dedicated resources on shared physical hardware with enhanced control and […]
Help TDS Hacks Legitimate Websites, Using PHP Templates to Display Fake Microsoft Security Alerts
GoDaddy Security researchers have unveiled a detailed analysis of Help TDS, a sophisticated Traffic Direction System operational since at least 2017, which exploits compromised websites […]
Lumma Operators Deploy Cutting-Edge Evasion Tools to Maintain Stealth and Persistence
Lumma infostealer affiliates’ complex operating framework was revealed by Insikt Group in a ground-breaking report published on August 22, 2025, underscoring their reliance on cutting-edge […]