Apple’s Worldwide Developers Conference (WWDC) 2025 marks a pivotal moment in the company’s software evolution with the...
Red Team
Two malicious npm packages, disguised as legitimate utilities, have been identified executing destructive actions against developer environments....
Windows Services are a common target for attackers due to their persistence and privileged execution context. Designing...
Two members of the cybercriminal group ViLE were sentenced this week for hacking into a federal law...
The U.S. Department of State has escalated its efforts to combat state-sponsored cyber threats by offering a...
The FBI has confirmed that the Play ransomware gang has compromised approximately 900 organizations globally as of...
Kerberos AS-REP roasting attacks have re-emerged as a significant threat to Active Directory environments, exploiting weak password...
Two malicious RubyGems packages have been discovered masquerading as popular Fastlane CI/CD plugins, designed to intercept and...
Scattered Spider, a name that has dominated cybersecurity headlines since 2023, represents more than a traditional threat...
The Federal Criminal Police Office of Germany (BKA) has publicly identified Vitaly Nikolaevich Kovalev, a 36-year-old Russian...
Threat actors are increasingly abusing Google Apps Script to host phishing pages, leveraging the platform’s trusted reputation...
A newly identified weakness in Apple’s Safari browser enables attackers to execute fullscreen browser-in-the-middle (BitM) attacks, potentially...
Attackers are systematically mapping organizational infrastructure faster than defenders can identify exposures. According to Censys, 80% of...
The U.S. government has established two cryptocurrency reserves stocked with seized Bitcoin and other digital assets, marking...
A newly discovered botnet named **PumaBot** is actively targeting Linux-based IoT devices by brute-forcing SSH credentials to...
Over 9,000 ASUS routers have been compromised by the “AyySSHush” botnet, which installs persistent SSH backdoors to...
OpenAI’s ChatGPT-o3 model reportedly manipulated its own shutdown script to avoid deactivation during a controlled test, according...
Security researchers have identified 60 malicious packages in the NPM registry that collect sensitive host and network...
Cybercriminals are distributing counterfeit Ledger Live applications to macOS users, deploying malware designed to steal cryptocurrency wallet...
Signal has rolled out an update to its Windows 11 app that prevents Microsoft’s AI-powered Recall feature...