APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been…

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Cybersecurity researchers have uncovered three malicious packages in the npm…

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221,…

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing…

10 Best Patch Management Tools 2025

In today’s digital landscape, maintaining secure and efficient IT systems…

Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have…

Aurascape Brings Visibility, Security Controls to Manage AI Applications

New cybersecurity startup Aurascape emerged from stealth today with an…

SpyMax Android Spyware: Full Remote Access to Monitor Any Activity

Threat intelligence experts at Perplexity uncovered an advanced variant of…

Trump Taps Sean Plankey To Fill Empty CISA Director Chair

Plankey has served in numerous cybersecurity positions in the past,…

Hackers Leveraging DNS MX Records To Dynamically Create Fake Logins Mimic as 100+ Brands

A sophisticated phishing operation has emerged that creatively leverages DNS…