Security researchers have uncovered a technique that allows attackers to abuse Cortex XDR’s Live Response feature as a covert command-and-control (C2) channel - effectively turning...
On 28 January 2026, Abu Dhabi will host one of the most discreet yet strategically significant cybersecurity gatherings of the year. The Cyber Envoy’s...
In a year where cybercriminals increasingly weaponized artificial intelligence to launch more convincing scams and stealthier malware, Google has dramatically scaled its...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
Tensions rise as news emerges of a South Korean citizen being detained in Russia on charges of cyber espionage. This incident highlights the ever-present...
PrestaShop store owners in France and Spain are facing a data breach crisis. A significant amount of customer data, reportedly impacting over 250,000 customers...
WordPress website owners beware! A recent vulnerability in a popular plugin has exposed thousands of websites to potential compromise. Let's delve into the details...
The financially motivated threat actor group, Magnet Goblin, has once again made headlines by deploying a new Linux variant of their custom malware, NerbianRAT....
A recently disclosed critical vulnerability in Fortinet's FortiOS operating system poses a serious threat to organizations using Fortinet SSL VPNs. This flaw, identified as...
Microsoft recently disclosed a data breach impacting a small percentage of its employees, primarily those working in cybersecurity and legal departments.
The attack, attributed...
Deepfakes, once primarily associated with humorous celebrity parodies, have evolved into a sophisticated tool for malicious actors.
Companies across various sectors are increasingly becoming...
The notorious Black Cat (also known as ALPHV) ransomware group has seemingly disappeared from the online landscape. Their servers, used to communicate with infected...
American Express (Amex) recently issued a security alert notifying cardholders of a data breach that potentially exposed their information through a third-party service provider....
Ransomware attacks, where malicious actors encrypt a victim's data and demand a ransom for its decryption, have become a major concern for individuals and...
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued three critical advisories highlighting vulnerabilities in widely used Industrial Control Systems (ICS) components.
These vulnerabilities,...
In a concerning development, a recent cyberattack severely disrupted the operations of Change Healthcare, the largest healthcare payment system in the United States. This...
Cybersecurity concerns are heightened as the notorious cybercrime groups GhostSec and Stormous join forces to launch double-extortion ransomware attacks across over 15 countries.
This collaboration...
Apple has released security patches to address critical zero-day vulnerabilities impacting various iPhone, iPad, and Mac models.
These vulnerabilities, actively exploited in the wild,...
VMware, a leading provider of virtualization software, recently released security patches to address critical vulnerabilities affecting its popular products, ESXi, Workstation, and Fusion.
These...
In a significant move, the United States Department of Justice (DOJ) has taken down the infrastructure behind Predator, a powerful spyware tool used to...
The recent news that hackers behind the February 2024 attack on Change Healthcare, a major healthcare IT provider, allegedly received a $22 million ransom...
In a landmark agreement, the UAE Cyber Security Council and the International Telecommunication Union (ITU) have joined forces to enhance global cybersecurity capacity. This...
The Cybersecurity and Infrastructure Security Agency (CISA) recently added a single new entry to its Known Exploited Vulnerabilities (KEV) Catalog, raising concerns about the...
Cybersecurity researchers have identified a concerning tactic employed by the cybercriminal group TA577, highlighting a potential vulnerability within the NTLM (NT LAN Manager) authentication...