APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been…

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Cybersecurity researchers have uncovered three malicious packages in the npm…

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221,…

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing…

10 Best Patch Management Tools 2025

In today’s digital landscape, maintaining secure and efficient IT systems…

DrayTek Routers Vulnerability Exploited in the Wild – Possibly Links to Reboot Loop

Multiple internet service providers worldwide are reporting widespread disruptions as…

Ballista Botnet Exploits Unpatched TP-Link Vulnerability, Infects Over 6,000 Devices

Unpatched TP-Link Archer routers have become the target of a…

Hackers Allegedly Selling FortiGate Firewall 0-Day Exploit on Dark Web Forum

A threat actor has reportedly advertised a zero-day exploit targeting…

Two Hackers Arrested For ATM Jackpotting by Deploying Malware

Federal prosecutors unsealed criminal complaints today against David Jose Gomez…

CISA Issues Alert on SonicWall Flaw Being Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a…