Key Takeaways New threat: A Mirai-based botnet variant, ShadowV2, is actively exploiting multiple vulnerabilities to compromise IoT devices. Widespread exploitation: The malware targets known vulnerabilities…
Key Takeaways Vulnerability discovered: A security flaw in jury management systems developed by Tyler Technologies has exposed data of jurors across several U.S. states. Data…
Key Takeaways Multi-council impact: A cyberattack has affected at least three London councils: the RBKC, Westminster City Council, and Hammersmith and Fulham Council. National investigation:…
Key Takeaways FCC alert: The FCC has issued a public notice about recent cyber intrusions targeting U.S. radio broadcasters. Attack method: Hackers are compromising improperly…
Key Takeaways System disruption: The OnSolve CodeRED emergency alert system, used by U.S. municipalities, has been taken offline following a cyberattack. Data breach: User information,…
Free Pro for Journalists/NGOs: Windscribe offers verified reporters and NGOs a free 1-year Pro plan. New AmneziaWG Protocol: Adds stealth WireGuard variant to bypass censorship…
Key Takeaways Novel attack chain: The RomCom threat group is now using the SocGholish malware delivery framework to deploy its Mythic Agent payload. Target profile:…
Key Takeaways Low-cost access: The latest version, WormGPT 4, is available on underground forums with subscription prices starting at $50 per month and $220 for…
Key Takeaways Flaw identified: A high-severity vulnerability, tracked as CVE-2025-59373, has been discovered in the ASUS MyASUS application. Potential Impact: It allows a low-privilege local…
Key Takeaways Arrest and charges: A 21-year-old Russian cybersecurity entrepreneur has been arrested in Moscow on treason charges. Public criticism: Kilin had publicly criticized the…
Key Takeaways Incident confirmation: Canon has confirmed that a subsidiary of Canon U.S.A., Inc., was impacted by the campaign exploiting the Oracle E-Business Suite vulnerability.…
Key Takeaways Advanced simulation: A new red-team tool, SandWorm11-24-25.exe, has been released, replicating the destructive techniques of the GRU Unit 74455 (Sandworm). LotL: The AI-generated…
Key Takeaways Botnet connection: Certain Android TV streaming boxes, such as Superbox, require intrusive software that forces the user's network to join a residential proxy…
Key Takeaways FCC fine: The FCC has fined Comcast $1.5 million following a data breach at a third-party vendor that exposed customer data. Vendor breach:…
Big Discount: AstrillVPN offers 27 months for $199, cutting regular pricing by over 40%. Full Features: Includes high-speed servers, strong encryption, streaming access, and advanced…
Enhanced Privacy Tools: Surfshark's Multi IP assigns unique IPs per session to reduce tracking. Automatic IP Rotation: Rotating IP changes addresses every five minutes within…
John Bruce – Quorum CyberJohn Bruce has joined Quorum Cyber as Chief Information Security Officer (CISO), tasked with strengthening the company’s defense operations and strategic…
Key Takeaways Autonomous attack: The Chinese state-sponsored group GTG-1002 used an AI agent to autonomously carry out 80-90% of the attack lifecycle. Zero exploit window:…
Key Takeaways Malicious domain durge: Researchers identified over 1,700 suspicious and malicious domains registered between September and November 2025. Targeted keywords: Campaigns heavily leverage holiday-specific…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: