Trending Now :
Beware of New Phishing Attack that Abuses Cloudflare and ZenDesk Pages to Steal Logins
A sophisticated phishing campaign has emerged, exploiting the trust placed in legitimate cloud hosting services.
Threat actors are leveraging Cloudflare Pages and ZenDesk platforms to...
New Business Email Protection Technique Blocks the Phishing Email Behind NPM Breach
Supply chain attacks targeting the JavaScript ecosystem have evolved into sophisticated operations combining domain manipulation with social engineering.
On September 8, 2025, threat actors launched...
Conti Group Member Responsible for Deploying Ransomware Extradited to USA
A Ukrainian national accused of playing a key role in the notorious Conti ransomware operation has been extradited from Ireland to face federal charges...
Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files
In October 2025, threat researchers at Cyble Research and Intelligence Labs uncovered a sophisticated cyber attack leveraging weaponized military documents to distribute an advanced...
Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets
Proton has launched a new initiative called the Data Breach Observatory. This program reveals serious problems that exist on the internet.
The cybersecurity company revealed...
Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure
Microsoft has released a non-security update for Windows 11 versions 24H2 and 25H2 that introduces an unusual bug affecting one of the operating system's...
New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic
A sophisticated campaign targeting military personnel across Russia and Belarus has emerged, deploying a complex multi-stage infection chain that establishes covert remote access through...
Cyber News Weekly
How Threat Intelligence Feeds Help Organizations Quickly Mitigate Malware...
Organizations today face constant threats from malware, including ransomware, phishing attacks, and zero-day exploits. These threats are evolving faster than ever.
Threat intelligence feeds emerge...
WhatsApp Introduces Passkey Encryption for Enhanced Chat Message Backup...
WhatsApp has unveiled passkey-encrypted backups, simplifying the protection of cherished chat histories without the burden of memorizing complex passwords.
This feature allows users to secure...
Microsoft Windows Cloud Files Minifilter Privilege Escalation Vulnerability Exploited
Microsoft has patched a critical race condition vulnerability in its Windows Cloud Files Minifilter driver, known as CVE-2025-55680, which enables local attackers to escalate...
EY Data Leak – Massive 4TB SQL Server Backup...
A massive 4TB SQL Server backup file belonging to global accounting giant Ernst & Young (EY) was discovered publicly accessible on Microsoft Azure.
The exposure,...
XWiki RCE Vulnerability Actively Exploted In Wild To Deliver...
A critical remote code execution (RCE) flaw in XWiki, a popular open-source wiki platform, was exploited in the wild to deploy cryptocurrency mining malware...
Expert Analysis
AI-Powered Ransomware Is the Emerging Threat That Could Bring Down Your...
The cybersecurity landscape has entered an unprecedented era of sophistication with the emergence of AI-powered ransomware attacks.
Recent research from MIT Sloan and Safe...
How Windows Command-line Utility PsExec Can Be Abused To Execute Malicious...
PsExec represents one of the most contradictory tools in the cybersecurity landscape, a legitimate system administration utility that has become a cornerstone of malicious...
Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In...
The cybersecurity landscape experienced a significant escalation in September 2025, when Cisco disclosed multiple critical zero-day vulnerabilities affecting its Adaptive Security Appliance (ASA) and...
Top Zero-Day Vulnerabilities Exploited in the Wild in 2025
The cybersecurity landscape in 2025 has been marked by an unprecedented surge in zero-day vulnerabilities actively exploited by threat actors.
According to recent data,...
Lessons Learned From Massive npm Supply Chain Attack Using “Shai-Hulud” Self-Replicating...
The JavaScript ecosystem experienced one of its most sophisticated and damaging supply chain attacks in September 2025, when a novel self-replicating worm dubbed "Shai-Hulud"...
ACR Stealer – Uncovering Attack Chains, Functionalities And IOCs
ACR Stealer represents one of the most sophisticated information-stealing malware families actively circulating in 2025, distinguished by its advanced evasion techniques and comprehensive data...
Top Research and Review
Top 10 Best Supply Chain Intelligence Security Companies in 2025
The digital world continues to face growing threats around software vulnerabilities, data breaches, and cyber supply chain attacks.
As companies rely more heavily on...
Top 10 Best Fraud Prevention Companies in 2025
In 2025, digital transactions are at an all-time high, but so are the risks of fraud.
Businesses in banking, e-commerce, fintech, and even social...
Top 10 Best Digital Footprint Monitoring Tools For Organizations in 2025
In today’s hyperconnected digital environment, organizations face increasing threats to their online presence and reputations.
From cyberattacks and phishing campaigns to data breaches and...
Top 10 Best Account Takeover Protection Tools in 2025
Account Takeover (ATO) attacks have become one of the most pressing security concerns for businesses in 2025.
With the rise of credential stuffing, phishing,...
Top 10 Best Brand Protection Solutions for Enterprises in 2025
Brand protection solutions are essential for enterprises in 2025 as digital commerce continues to grow and online threats evolve more rapidly than ever.
With...
Top 10 Best Digital Risk Protection (DRP) Platforms in 2025
In 2025, businesses are facing unprecedented challenges in the digital risk landscape. With cyber threats evolving rapidly, organizations need advanced solutions to detect, assess,...










.webp?w=150&resize=150,150&ssl=1)





.webp?w=324&resize=324,160&ssl=1)
.webp?w=324&resize=324,160&ssl=1)



.webp?w=324&resize=324,160&ssl=1)




.webp?w=324&resize=324,160&ssl=1)




