Oct 10, 2025Ravie LakshmananVulnerability / Zero-Day Cybersecurity company Huntress said it has observed active in-the-wild exploitation…
Technology
CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
Oct 10, 2025Ravie LakshmananVulnerability / Threat Intelligence Dozens of organizations may have been impacted following the…
MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More
Oct 09, 2025Ravie LakshmananCybersecurity / Hacking News Cyber threats are evolving faster than ever. Attackers now…
The Evolution of UTA0388’s Espionage Malware
Oct 09, 2025Ravie LakshmananCyber Espionage / Artificial Intelligence A China-aligned threat actor codenamed UTA0388 has been…
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
Oct 09, 2025Ravie LakshmananMobile Security / Malware A rapidly evolving Android spyware campaign called ClayRat has…
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
Oct 09, 2025Ravie LakshmananCloud Security / Network Security SonicWall on Wednesday disclosed that an unauthorized party…
SaaS Breaches Start with Tokens
Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are…
AI Becomes Russia’s New Cyber Weapon in War on Ukraine
Oct 09, 2025Ravie LakshmananArtificial Intelligence / Malware Russian hackers’ adoption of artificial intelligence (AI) in cyber…
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme
Oct 09, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw…
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
Oct 08, 2025Ravie LakshmananVulnerability / Software Security Cybersecurity researchers have disclosed details of a now-patched vulnerability…