TTechnology Read More Social Engineering Hackers Target Okta Single Sign OnJanuary 28, 2026 Fraud Management & Cybercrime , Identity & Access Management , Security Operations ShinyHunters Campaign Uses Voice Phishing to…
TTechnology Read More Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active ExploitationJanuary 27, 2026 Ravie LakshmananJan 27, 2026Zero-Day / Vulnerability Microsoft on Monday issued out-of-band security patches for a high-severity Microsoft Office…
TTechnology Read More New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized MemoryDecember 27, 2025 Dec 27, 2025Ravie LakshmananDatabase Security / Vulnerability A high-severity security flaw has been disclosed in MongoDB that could…
TTechnology Read More New MacSync macOS Stealer Uses Signed App to Bypass Apple GatekeeperDecember 24, 2025 Dec 24, 2025Ravie LakshmananMalware / Endpoint Security Cybersecurity researchers have discovered a new variant of a macOS information…
HHealthcare Read More Tech provider for NHS England confirms data breachDecember 18, 2025 DXS International, a U.K.-based company that provides healthcare tech for England’s National Health Service (NHS), disclosed a cyberattack…
TTechnology Read More 700 Instances of Self-Hosted Git Service ExploitedDecember 11, 2025 Unpatched Flaw in Open-Source Gogs Service Facilitates Remote Code Execution Mathew J. Schwartz (euroinfosec) • December 11, 2025…
TTechnology Read More Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in ChinaDecember 4, 2025 The threat actor known as Silver Fox has been spotted orchestrating a false flag operation to mimic a…
AArtificial intelligence Read More Opinion: China controls this key resource AI needs — threatening stocks and the U.S. economy – MarketWatchNovember 21, 2025 Opinion: China controls this key resource AI needs — threatening stocks and the U.S. economy MarketWatch America’s Open Source…
TTechnology Read More CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login AttacksNovember 13, 2025 Nov 13, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added…
AArtificial intelligence Read More Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code HourlyNovember 5, 2025 Nov 05, 2025Ravie LakshmananArtificial Intelligence / Threat Intelligence Google on Wednesday said it discovered an unknown threat actor…
TTechnology Read More Warnings Mount Over Windows Server Update Services HacksOctober 28, 2025 Thousands of Windows Server Update Services Observed Online Akshaya Asokan (asokan_akshaya) • October 28, 2025 Image:…
AArtificial intelligence Read More Russia, China increasingly using AI to escalate cyberattacks on US, Microsoft findsOctober 16, 2025 WASHINGTON — WASHINGTON (AP) — Russia, China, Iran and North Korea have sharply increased their use of artificial…