Category: Articles

Critical Ivanti VPN Flaw Exploited to Deploy Evasive SP...

A newly discovered vulnerability in Ivanti Connect Secure (CVE-2025-0282) has been exploited by attackers to deploy the sophistica...

Apple Patches Critical iOS Vulnerability Exploited in T...

Apple has rolled out a security update to address a critical vulnerability (CVE-2025-24200) that may have been used in highly soph...

Lee Enterprises Cyberattack Disrupts Newspaper Operatio...

Lee Enterprises, a major U.S. newspaper publisher with 72 markets, has reported a cyberattack to the SEC after an outage impacted ...

Memorial Hospital Ransomware Attack Exposes Data of 120...

Memorial Hospital and Manor, a small healthcare facility in Bainbridge, Georgia, is alerting 120,000 individuals that their data w...

Microsoft Warns Developers Against Using Publicly Discl...

Microsoft has cautioned that website developers are unknowingly exposing their companies to cyber threats by embedding publicly av...

LLMjacking Surge: Hackers Exploit Stolen DeepSeek Acces...

Sophisticated LLMjacking operations have successfully hijacked access to DeepSeek’s AI models just weeks after their public releas...

SolarWinds Acquired by Turn/River Capital in $4.4 Billi...

SolarWinds, the IT and software company at the center of a major supply chain cyberattack in 2020, has announced its acquisition b...

Urgent Dell Update Manager Plugin Vulnerability Exposes...

A critical security vulnerability (CVE-2025-22402) has been identified in the Dell Update Manager Plugin, affecting versions 1.5.0...

Critical Logsign Vulnerability Allows Remote Authentica...

A severe security flaw (CVE-2025-1044) has been discovered in Logsign's Unified SecOps Platform, enabling remote attackers to bypa...

Researcher Bypasses OpenAI’s New Security Feature in o3...

Just days after OpenAI released its o3-mini model, a prompt engineer has challenged the effectiveness of its enhanced security pro...

Cybercriminals Exploit DeepSeek’s Popularity with Phish...

In the weeks following the global buzz around China's DeepSeek and its cost-effective AI model, cybercriminals have been actively ...

Ransomware in 2025: Top Threats and How to Stop Them

Ransomware attacks are becoming more aggressive, locking critical files and demanding millions in ransom. Even if victims pay, the...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.