This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Category: Articles
Microsoft Sets New Email Authentication Standards for H...
Microsoft is introducing stricter security measures for high-volume email senders—those sending over 5,000 emails daily—with enfor...
Microsoft Warns of Tax-Themed Phishing Surge Using QR C...
Microsoft has raised the alarm over a wave of phishing campaigns exploiting tax season themes to spread malware and steal user cre...
Quick Share for Windows Vulnerability Reopens File Tra...
Cybersecurity experts have uncovered a new vulnerability in Google’s Quick Share utility for Windows, which could be leveraged to ...
SonicWall Firewall Vulnerability CVE-2024-53704 Exploit...
A critical authentication bypass vulnerability, CVE-2024-53704, in SonicWall firewalls has been exploited by cybercriminals to hij...
Critical Cisco AnyConnect VPN Vulnerability Exposes Mer...
Cisco has disclosed a high-severity vulnerability (CVE-2025-20212) affecting its Meraki MX and Z Series devices with AnyConnect VP...
Bec Fraud
Fraud in Bec
ImageRunner Vulnerability in Google Cloud Run Exposed P...
Cybersecurity researchers have unveiled details about a now-patched privilege escalation flaw in Google Cloud Platform (GCP) Cloud...
Apple Patches Actively Exploited Vulnerabilities in Old...
Apple has released security updates to address three actively exploited vulnerabilities in older iPhone, iPad, and Mac models, ens...
FIN7 Deploys Python-Based Anubis Backdoor for Stealthy ...
The financially driven cybercrime group FIN7 has been linked to a Python-based backdoor named Anubis, which enables remote access ...
New Android Banking Trojan ‘Crocodilus’ Targets Users i...
Cybersecurity researchers have uncovered a sophisticated new Android banking malware called Crocodilus, which is primarily targeti...
SUN:DOWN Vulnerabilities Expose Critical Risks in Solar...
Cybersecurity researchers have identified 46 new security vulnerabilities across solar inverter products from Sungrow, Growatt, an...
Introducing The Low-Key Access Broker Fueling Russian S...
Russian Threat Groups, Including As The Military Cyber Unit Responsible For Attempted Coups, Assassinations, And Influence Operati...