Nov 22, 2025Ravie LakshmananZero-Day / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on…
Technology
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links…
APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed…
Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
Nov 21, 2025Ravie LakshmananVulnerability / Threat Mitigation Grafana has released security updates to address a maximum…
Why IT Admins Choose Samsung for Mobile Security
Nov 21, 2025The Hacker NewsMobile Security / Data Protection Ever wonder how some IT teams keep…
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
Nov 21, 2025Ravie LakshmananData Protection / Technology In a surprise move, Google on Thursday announced that…
SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
Nov 21, 2025Ravie LakshmananCompliance / Cyber Attack The U.S. Securities and Exchange Commission (SEC) has abandoned…
Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
Nov 21, 2025Ravie LakshmananData Breach / SaaS Security Salesforce has warned of detected “unusual activity” related…
Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
Nov 20, 2025Ravie LakshmananBotnet / Malware Cybersecurity researchers have warned of an actively expanding botnet dubbed…
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
Nov 20, 2025Ravie LakshmananVulnerability / Cloud Computing Oligo Security has warned of ongoing attacks exploiting a…