Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year

Nov 18, 2025Ravie LakshmananBug Bounty / Data Privacy Meta on Tuesday said it has made available…

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

Nov 18, 2025The Hacker NewsCloud Security / Compliance You’ve probably already moved some of your business…

Microsoft Mitigates Record 15.72 Tbps DDoS Attack Driven by AISURU Botnet

Nov 18, 2025Ravie LakshmananIoT Security / Botnet Microsoft on Monday disclosed that it automatically detected and…

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Nov 18, 2025Ravie LakshmananBrowser Security / Vulnerability Google on Monday released security updates for its Chrome…

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

Nov 17, 2025Ravie Lakshmanan Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social engineering…

5 Reasons Why Attackers Are Phishing Over LinkedIn

Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks…

Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More

Nov 17, 2025Ravie LakshmananCybersecurity / Hacking News This week showed just how fast things can go…

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

The threat actor known as Dragon Breath has been observed making use of a multi-stage loader…

Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time

Nov 17, 2025Ravie LakshmananVulnerability / Mobile Security Google has disclosed that the company’s continued adoption of…

RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

Nov 15, 2025Ravie LakshmananMalware / Vulnerability The botnet malware known as RondoDox has been observed targeting…