Nov 04, 2025Ravie LakshmananRansomware / Cybercrime Federal prosecutors in the U.S. have accused a trio of…
Technology
Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit
Nov 04, 2025Ravie LakshmananArtificial Intelligence / Vulnerability Google’s artificial intelligence (AI)-powered cybersecurity agent called Big Sleep…
Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed
Nov 04, 2025Ravie Lakshmanan Cybersecurity researchers have disclosed details of four security flaws in Microsoft Teams…
A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
The nascent collective that combines three prominent cybercrime groups, Scattered Spider, LAPSUS$, and ShinyHunters, has created…
Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
Nov 04, 2025Ravie LakshmananCybercrime / Money Laundering Nine people have been arrested in connection with a…
Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks
Nov 04, 2025Ravie LakshmananVulnerability / Supply Chain Security Details have emerged about a now-patched critical security…
Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors
Nov 04, 2025Ravie LakshmananMalware / Cyber Espionage Threat actors are leveraging weaponized attachments distributed via phishing…
Ransomware Defense Using the Wazuh Open Source Platform
Ransomware is malicious software designed to block access to a computer system or encrypt data until…
Government Agencies Issue Emergency Guidance for Microsoft Exchange Server
Image: Envato If your team still runs Microsoft Exchange Server, treat this as a fire alarm.…
Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel
Nov 04, 2025Ravie LakshmananArtificial Intelligence / Malware Microsoft has disclosed details of a novel backdoor dubbed…