Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed…
Technology
Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
Oct 23, 2025Ravie LakshmananData Breach / Vulnerability E-commerce security company Sansec has warned that threat actors…
TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
Oct 22, 2025Ravie LakshmananVulnerability / Data Protection Cybersecurity researchers have disclosed details of a high-severity flaw…
Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware
Oct 22, 2025Ravie LakshmananCyber Espionage / Network Security Government, financial, and industrial organizations located in Asia,…
Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
Oct 22, 2025Ravie LakshmananCryptocurrency / Software Integrity Cybersecurity researchers have uncovered a new supply chain attack…
Bridging the Remediation Gap: Introducing Pentera Resolve
From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed…
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations associated with…
Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
Oct 22, 2025Ravie LakshmananMalware / Cyber Espionage The Iranian nation-state group known as MuddyWater has been…
Samsung takes on Apple’s Vision Pro with new Galaxy XR headset
After months of speculation, Samsung has finally unveiled its Galaxy XR headset to take on Apple’s…
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch
Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell…