Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks

Oct 06, 2025Ravie LakshmananVulnerability / Threat Intelligence Oracle has released an emergency update to address a…

One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief

Oct 04, 2025Ravie LakshmananAgentic AI / Enterprise Security Cybersecurity researchers have disclosed details of a new…

Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day

Oct 04, 2025Ravie LakshmananVulnerability / Network Security Threat intelligence firm GreyNoise disclosed on Friday that it…

Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer

A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer…

Adds Device Fingerprinting, PNG Steganography Payloads

The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and…

How Passwork 7 Addresses Complexity of Enterprise Security

Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to…

Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL

Oct 03, 2025Ravie LakshmananMalware / Online Security Brazilian users have emerged as the target of a…

New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT

Oct 03, 2025Ravie LakshmananCybersecurity / Malware A threat actor that’s known to share overlaps with a…

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild

Oct 03, 2025Ravie LakshmananVulnerability / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on…

Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like…