-
Security
/ 1 week agoMajor Vendors Release Critical Security Patches for Widespread Vulnerabilities
On the latest monthly Patch Tuesday, more than 60 software vendors, including major technology firms, have issued security updates to address...
-
Security
/ 1 week agoAPT36 and SideCopy Target Indian Entities with Cross-Platform RATs
Indian defense sector organizations and government-aligned entities have been targeted by multiple, sophisticated cyber campaigns designed to compromise both Windows and...
-
Security
/ 1 week agoNew Ransomware Uses Legitimate Drivers to Disable Security
cybersecurity researchers have identified a new ransomware family, named Reynolds, that incorporates a sophisticated technique to disable endpoint security tools on...
-
Security
/ 1 week agoNorth Korean Operatives Use Fake LinkedIn Profiles for Cyber Infiltration
Information technology workers linked to North Korea are applying for remote jobs using fraudulent LinkedIn profiles that impersonate real professionals. This...
-
Security
/ 1 week agoDutch Agencies Confirm Data Breach via Ivanti Zero-Day Flaw
Two major Dutch government bodies have confirmed that their systems were compromised in cyber attacks exploiting critical vulnerabilities in Ivanti‘s mobile...
-
Security
/ 1 week agoWarlock Ransomware Hits SmarterTools via Unpatched Email Server
SmarterTools confirmed last week that its corporate network was breached by the Warlock ransomware group. The attackers gained access by exploiting...
-
Security
/ 1 week agoZAST.AI Secures $6M to Advance AI Code Security
On January 5, 2026, the Seattle based artificial intelligence security startup ZAST.AI announced it has raised $6 million in a Pre...
-
Security
/ 1 week agoFortinet Patches Critical SQL Injection Vulnerability in FortiClientEMS
Fortinet has issued critical security updates to address a severe vulnerability in its FortiClient Enterprise Management Server (EMS) software. The flaw,...
-
Security
/ 1 week agoCyberattack Strategy Shifts from Ransomware to Stealth
A new cybersecurity report indicates a fundamental shift in the primary objectives of cybercriminals, moving away from disruptive ransomware attacks toward...
-
Security
/ 1 week agoSolarWinds Web Help Desk Exploited in Multi-Stage Network Attacks
Microsoft has disclosed that threat actors are actively exploiting internet-exposed instances of SolarWinds Web Help Desk software to gain initial access...

