Oct 28, 2025Ravie LakshmananMalware / Mobile Security Cybersecurity researchers have disclosed details of a new Android…
Technology
Researchers Expose GhostCall and GhostHire: BlueNoroff’s New Malware Chains
Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as…
Why Early Threat Detection Is a Must for Long-Term Business Growth
In cybersecurity, speed isn’t just a win — it’s a multiplier. The faster you learn about…
Is Your Google Workspace as Secure as You Think it is?
The New Reality for Lean Security Teams If you’re the first security or IT hire at…
Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware
The zero-day exploitation of a now-patched security flaw in Google Chrome led to the distribution of…
SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats
Oct 28, 2025Ravie LakshmananCyber Espionage / Malware A European embassy located in the Indian capital of…
X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts
Oct 27, 2025Ravie LakshmananData Protection / Authentication Social media platform X is urging users who have…
New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands
Oct 27, 2025Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have discovered a new vulnerability in OpenAI’s…
WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens
Oct 27, 2025Ravie LakshmananCybersecurity / Hacking News Security, trust, and stability — once the pillars of…
Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more…