-
Security
/ 2 months agoDutch Agencies Confirm Data Breach via Ivanti Zero-Day Flaw
Two major Dutch government bodies have confirmed that their systems were compromised in cyber attacks exploiting critical vulnerabilities in Ivanti‘s mobile...
-
Security
/ 2 months agoWarlock Ransomware Hits SmarterTools via Unpatched Email Server
SmarterTools confirmed last week that its corporate network was breached by the Warlock ransomware group. The attackers gained access by exploiting...
-
Security
/ 2 months agoZAST.AI Secures $6M to Advance AI Code Security
On January 5, 2026, the Seattle based artificial intelligence security startup ZAST.AI announced it has raised $6 million in a Pre...
-
Security
/ 2 months agoFortinet Patches Critical SQL Injection Vulnerability in FortiClientEMS
Fortinet has issued critical security updates to address a severe vulnerability in its FortiClient Enterprise Management Server (EMS) software. The flaw,...
-
Security
/ 2 months agoCyberattack Strategy Shifts from Ransomware to Stealth
A new cybersecurity report indicates a fundamental shift in the primary objectives of cybercriminals, moving away from disruptive ransomware attacks toward...
-
Security
/ 2 months agoSolarWinds Web Help Desk Exploited in Multi-Stage Network Attacks
Microsoft has disclosed that threat actors are actively exploiting internet-exposed instances of SolarWinds Web Help Desk software to gain initial access...
-
Security
/ 2 months agoSingapore Telcos Targeted by China-Linked Cyber Espionage Group
Singapore‘s Cyber Security Agency (CSA) revealed on Monday that the nation’s telecommunications sector was the target of a sophisticated cyber espionage...
-
Security
/ 2 months agoBeyondTrust Patches Critical RCE Flaw in Remote Support Tools
BeyondTrust has issued critical security updates for its Remote Support and Privileged Remote Access software. The patches address a severe vulnerability...
-
Security
/ 2 months agoWorm Targets Cloud Infrastructure for Criminal Operations
cybersecurity researchers have identified a large-scale, automated campaign exploiting cloud-native platforms to establish malicious infrastructure for future attacks. The worm-driven activity,...
-
Security
/ 2 months agoBloody Wolf Targets Uzbekistan, Russia with NetSupport RAT
A cyber threat actor known as Bloody Wolf has been identified as the source of a spear-phishing campaign targeting organizations in...

