Raven Stealer - A new iteration of the lightweight information stealer known as Raven Stealer is rapidly gaining traction in underground.| Cyber Security News
Astaroth, a notorious banking trojan, has reemerged in a campaign that abuses trusted cloud platforms to maintain resilience against takedown efforts. The infection process begins with highly targeted phishing emails, often themed around business, document signing, or job applications, which trick recipients into downloading a ZIP file. This archive contains an obfuscated Windows Shortcut (LNK) […]| Cyber Security News
As AI-driven security solutions proliferate, this transparent benchmark provides critical insight into accuracy, speed, and actionable intelligence generation.| Cyber Security News
A critical weakness in Cisco’s IOS and IOS XE platforms allows an unauthenticated adversary to bypass TACACS+ authentication, potentially granting full administrative control of affected routers and switches. Tracked as CVE-2025-20160 and carrying a CVSS 3.1 score of 8.1, the flaw stems from improper validation of the TACACS+ shared secret configuration. Cisco has not observed […]| Cyber Security News
Today, the National Cyber Security Centre (NCSC) – part of GCHQ – issued further advice to help network defenders mitigate| Cyber Security News
A recent presentation at Botconf 2025 in Angers shed light on the ongoing threat posed by RapperBot, a sophisticated botnet.| Cyber Security News
The patches were made available on July 15, 2025, targeting critical security flaws that could potentially compromise Windows systems and enable denial-of-service attacks.| Cyber Security News
A critical security flaw in the NVIDIA Container Toolkit (NCT) the foundational software powering many cloud-based AI and GPU services.| Cyber Security News
According to the Dmpdump report, the campaign first emerged on VirusTotal on August 28, 2025, when a file uploaded from Malaysia triggered alarms.| Cyber Security News
The vulnerability arises from how Axios decodes data: URLs, allowing an attacker to trigger unbounded memory allocation and crash Node.js processes.| Cyber Security News
A colossal illegal Internet Protocol Television (IPTV) network, revealing a sophisticated piracy operation that has been active for years across more than 1,000 domains and over 10,000 unique IP addresses.| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
The breach originated from attackers exploiting the Drift communication and sales engagement platform, which maintained connections to various Salesforce instances.| Cyber Security News
Empire, introducing enhanced agent capabilities and comprehensive API support designed to streamline post-exploitation operations.| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Microsoft 365 administrators across multiple global regions are currently experiencing significant difficulties adding multifactor authentication (MFA).| Cyber Security News
The Lumma information stealer, a notorious C++ malware strain, continues its prominence in the cyber threat landscape.| Cyber Security News
ESPHome vulnerability - A critical vulnerability has been discovered in the ESPHome web server component on the ESP-IDF platform.| Cyber Security News
A significant global effort to patch a critical zero-day remote code execution (RCE) vulnerability in Citrix NetScaler devices has seen the number of exposed systems drop from approximately 28,200 to 12,400 in just one week.| Cyber Security News
The vulnerabilities, tracked as CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424, pose significant risks to organizations relying on these network infrastructure components for application delivery and secure remote access.| Cyber Security News
Cybersecurity researchers at GreyNoise have uncovered a significant pattern that could revolutionize how organizations prepare for emerging threats.| Cyber Security News
A sophisticated threat campaign leveraging GitHub’s infrastructure has been attributed to the North Korean state-backed threat group.| Cyber Security News
Telegram SSH brute-force - Socket's Threat Research Team has uncovered a sophisticated supply chain attack targeting cybersecurity.| Cyber Security News
The UK NCSC has released an in-depth technical report exposing a sophisticated malware campaign, dubbed “UMBRELLA STAND”.| Cyber Security News
Cybersecurity analysts at WithSecure report a steady uptick in highly targeted cyber activities utilizing Remote Monitoring and Management (RMM) tools.| Cyber Security News
Wolf's Assault - A sophisticated APT group known as Scaly Wolf has executed a persistent multi-year campaign against a Russian.| Cyber Security News
Workday recently disclosed that it was targeted in a social engineering campaign designed to compromise employee trust and gain unauthorized access to sensitive systems.| Cyber Security News
Red Hat, Inc. and AMD have announced a strategic collaboration aimed at expanding customer choice in building, deploying, and managing AI workloads.| Cyber Security News
This latest iteration features a more compact development cycle of just 42 days, resulting in focused improvements and critical backend changes that will impact developers worldwide.| Cyber Security News
Released on August 14, 2025, this major update introduces groundbreaking features that extend VirtualBox's capabilities across multiple platforms| Cyber Security News
Microsoft Threat Intelligence has uncovered a sophisticated cyberespionage campaign by the Russian state actor Secret Blizzard.| Cyber Security News
The flaw, tracked as CVE-2025-2183 with a CVSS score of 4.5, affects the certificate validation process in GlobalProtect applications running on Windows and Linux systems.| Cyber Security News
A recent demonstration has brought to light a critical exploit chain capable of bypassing modern zero-trust security policies.| Cyber Security News
Adversary-in-the-Middle (AitM) phishing attacks have rapidly escalated in both scale and sophistication, posing a significant threat.| Cyber Security News
Qilin ransomware - The Qilin ransomware group has once again dominated the cyberthreat landscape in July 2025, claiming 73 victims.| Cyber Security News
Microsoft has rolled out a comprehensive set of security enhancements aimed at countering the surge in AiTM phishing attacks.| Cyber Security News