Lazarus Group’s Phantom Circuit hit 233 victims with trojanized software, using React and Node.js for control.
Join Ravid Circus, a seasoned pro in cybersecurity and AI, as we peel back the layers of AI in cybersecurity through a ...
SLAP & FLOP attacks exploit Apple M-series speculative execution flaws, leaking emails, location data, and credit cards via ...
The Interlock ransomware group begins its attack with a strategic and highly deceptive method known as a Drive-by Compromise.
CVE-2025-22604 in Cacti (CVSS 9.1) enables authenticated attackers to execute remote code. Upgrade to version 1.2.29 to ...
UAC-0063 was first flagged by the Romanian cybersecurity company in May 2023 in connection with a campaign that targeted government entities in Central Asia with a data exfiltration malware known as ...
VMware Avi Load Balancer flaw (CVE-2025-22217, CVSS 8.6) enables unauthenticated SQL injection. No workarounds exist—Broadcom ...
Critical zero-day vulnerability CVE-2024-40891 in Zyxel CPE devices is under active attack, affecting 1,500+ devices.
DeepSeek’s chatbot app tops Apple’s U.S. free chart, but malicious attacks force registration limits. Privacy concerns arise ...
Since July 2024, a phishing campaign in Poland and Germany has used PureCrypter to deploy TorNet via TOR, evading cloud ...
API vulnerability in airline-linked travel service exposed millions to account takeovers, booking fraud, and data theft ...
Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to ...