Phishing training needs a new hook — here’s how to rethink your approach

Phishing is a tried-and-true attack vector. These attacks account for…

Malicious Ivanti VPN Client Sites in Google Search Deliver Malware — Users Warned

Cybersecurity researchers at Zscaler have uncovered a sophisticated malware campaign…

PhantomVAI Loader Launches Global Campaign to Distribute AsyncRAT, XWorm, FormBook, and DCRat

PhantomVAI Loader, a newly renamed multi-stage .NET loader tracked by…

NightMARE: A Python Library for Advanced Malware Analysis and Threat Intelligence Extraction

Elastic Security Labs has officially released nightMARE version 0.16, a…

Cisco SNMP Vulnerability Actively Exploited to Install Linux Rootkits

Cybersecurity researchers at Trend Micro have discovered an active attack…

PupkinStealer Exploits Web Browser Passwords and App Tokens to Exfiltrate Data Through Telegram

A newly identified .NET-based information-stealing malware, dubbed PupkinStealer (also known…

Cybercriminals intensify hunt for exposed Git secrets

Git configuration files exposed in public repositories are being aggressively…

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol,…

DragonForce: Emerging Hybrid Cyber Threat in the 2025 Ransomware Landscape

DragonForce has swiftly risen as a formidable player in 2025,…

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies,…