Meta has officially launched an API for its Llama AI models, providing developers with tools to integrate...
Red Team
Recent reports highlight a surge in MSSQL injection attacks, with threat actors exploiting vulnerabilities to execute remote...
Cybersecurity researchers from Hunt have identified a server hosting advanced malicious tools, including SuperShell command-and-control (C2) payloads...
France has publicly accused Russian military intelligence (GRU) of conducting a series of cyberattacks against French entities...
Windows shortcut files (LNK) have become a preferred attack vector for threat actors following Microsoft’s decision to...
Defense Secretary Pete Hegseth has terminated the Women, Peace, and Security (WPS) program, labeling it a “woke...
MintsLoader has emerged as a sophisticated malware loader distributing payloads like GhostWeaver, StealC, and a modified BOINC...
A sophisticated phishing campaign is targeting WooCommerce users with fraudulent emails urging them to install a fake...
Satellite systems are increasingly becoming targets of sophisticated cyberattacks, with nation-states and cybercriminal groups exploiting vulnerabilities in...
Cybercriminals are now compressing attack timelines from reconnaissance to compromise to minutes rather than days, according to...
China has developed a deep-sea device capable of cutting undersea communication cables at depths of up to...
Pulsegram is a Python-based keylogger integrated with a Telegram bot, designed for capturing keystrokes, clipboard content, and...
In today’s evolving threat landscape, organizations rely on incident response playbooks (IRPs) to mitigate cyberattacks. However, these...
Hitachi Vantara, the data infrastructure subsidiary of Japanese conglomerate Hitachi, executed emergency containment measures on April 26,...
The SANS Internet Storm Center (ISC) Stormcast for April 29, 2025, highlights critical cybersecurity threats, including active...
Cybersecurity researchers have uncovered a publicly accessible server operated by an affiliate of the Fog ransomware group,...
Bug hunting has transformed from a niche activity into a professionalized field where security researchers earn substantial...
SberTech, a Russian software developer under the Sber ecosystem, has expanded its public bug bounty program on...
The Russian software integration firm “Раздолье-Консалт,” specializing in 1C enterprise solutions, has successfully completed a comprehensive security...
Amazon has taken a significant step into the satellite internet market with the successful launch of its...