Whistleblower: DOGE Siphoned NLRB Case Data

A security architect with the National Labor Relations Board (NLRB)…

‘Fog’ Hackers Troll Victims With DOGE Ransom Notes

Since January, threat actors distributing the malware have notched up…

‘Elusive Comet’ Attackers Use Zoom to Swindle Victims

The threat actor uses sophisticated social engineering techniques to infect…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium-sized businesses, especially those…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium businesses, especially those…

RansomHub Affiliate Deploying New Custom Backdoor Dubbed ‘Betruger’ For Persistence

A RansomHub affiliate has been observed recently deploying a new…

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has…

Appsmith Developer Tool Vulnerability Let Attackers Execute Remote Code

Security researchers have uncovered multiple critical vulnerabilities in Appsmith, a…

Kali Linux 2025.1a New Tool & Upates to Desktop Environments

 Kali Linux, the widely acclaimed cybersecurity-focused distribution, has officially unveiled its latest…

Cybersecurity Weekly Recap: Key Updates on Attacks, Vulnerabilities, & Data Breaches

Welcome to this week’s Cybersecurity Newsletter, providing you with the…