Apple has taken another step toward the official release of iOS 18.4 by seeding the third developer beta of the update to testers late on […]
North Korean Hackers Weaponizing ZIP Files To Execute Malicious PowerShell Scripts
Security researchers have identified a sophisticated attack campaign attributed to APT37, a North Korean state-sponsored hacking group also known as ScarCruft, Reaper, and Red Eyes. […]
Google Pays Out Nearly $12M in 2024 Bug Bounty Program
The program underwent a series of changes in the past year, including richer maximum rewards in a variety of bug categories. The original article found […]
CISA Adds 2 VeraCore Vulnerabilities to Known Actively Exploit Vulnerability Catalog
CISA has likely added two VeraCore vulnerabilities, CVE-2024-57968 and CVE-2025-25181, to its Known Exploited Vulnerabilities (KEV) catalog due to active exploitation by the XE Group. […]
‘SideWinder’ Intensifies Attacks on Maritime Sector
The likely India-based threat group is also targeting logistics companies in a continued expansion of its activities. The original article found on darkreading Read More
APT ‘Blind Eagle’ Targets Colombian Government
The South American-based advanced persistent threat group is using an exploit with a “high infection rate,” according to research from Check Point. The original article […]
Ex-Employee Found Guilty in Revenge Kill-Switch Scheme
Clandestine kill switch was designed to lock out other users if the developer’s account in the company’s Windows Active Directory was ever disabled. The original […]
Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. “The polymorphic extensions create a pixel […]
GitHub-Hosted Malware Infects 1M Windows Users
Microsoft has identified a complex, malvertising-based attack chain that delivered Lumma and other infostealers to enterprise and consumer PC users; the campaign is unlikely the […]
When Seconds Count: How to Survive Fast-and-Furious DDoS Microbursts
In the battle against two-minute micro-attacks that can knock out critical communication services, the difference between success and failure can literally come down to seconds. […]