-
Security
/ 2 months agoGoogle Exposes Coruna iOS Exploit Kit Targeting iPhones
Google has identified a new and powerful exploit kit, named Coruna, targeting Apple iPhones running iOS versions 13.0 through 17.2.1. The...
-
Security
/ 2 months agoHacktivist DDoS Attacks Surge After Middle East Conflict
cybersecurity researchers have reported a significant spike in retaliatory cyberattacks following recent military actions in the Middle East. Between February 28...
-
Security
/ 2 months agoFake Tech Support Spam Deploys Havoc C2 in New Campaign
Security researchers have identified a new campaign where threat actors are impersonating IT support staff to deploy a powerful command-and-control framework...
-
Security
/ 2 months agoSloppyLemming Hackers Target Pakistan, Bangladesh Governments
A cyber threat group known as SloppyLemming has been linked to a new campaign targeting government bodies and critical infrastructure operators...
-
Security
/ 2 months agoGoogle Confirms Active Exploitation of Android Graphics Flaw
Google disclosed on Monday that a high-severity security vulnerability affecting a Qualcomm component used in Android devices has been actively exploited....
-
Security
/ 2 months agoMicrosoft Warns of OAuth Phishing Targeting Government Entities
Microsoft issued a public warning on Monday regarding sophisticated phishing campaigns that are successfully bypassing standard email and browser security measures....
-
Security
/ 2 months agoNew Phishing Suite Bypasses MFA Using Reverse Proxy
cybersecurity researchers have identified a new and sophisticated phishing platform that is being used to circumvent multi-factor authentication protections. The toolkit,...
-
Security
/ 2 months agoAI Agents Emerge as Unmanaged Enterprise Force
A new class of powerful, autonomous artificial intelligence systems is rapidly being deployed within corporate environments, often operating outside of traditional...
-
Security
/ 2 months agoOpen-Source AI Tool Used in Global Fortinet Firewall Attacks
Security researchers have identified the use of an open-source, artificial intelligence-powered platform in a widespread campaign targeting network security appliances across...
-
Security
/ 2 months agoCISOs Face Critical Challenge in Building Effective Security Teams
Chief Information Security Officers globally are confronting a fundamental structural challenge within their Security Operations Centers, according to industry analysis. The...

