Recent
Server Room – IoT Router

Key Takeaways New threat: A Mirai-based botnet variant, ShadowV2, is actively exploiting multiple vulnerabilities to compromise IoT devices. Widespread exploitation: The malware targets known vulnerabilities…

|
Published
Courtroom – Jury Box – Judge’s Bench

Key Takeaways Vulnerability discovered: A security flaw in jury management systems developed by Tyler Technologies has exposed data of jurors across several U.S. states. Data…

|
Published
Map - Lock - Laptops

Key Takeaways Multi-council impact: A cyberattack has affected at least three London councils: the RBKC, Westminster City Council, and Hammersmith and Fulham Council. National investigation:…

|
Published
Radio Signal - Hijacked

Key Takeaways FCC alert: The FCC has issued a public notice about recent cyber intrusions targeting U.S. radio broadcasters. Attack method: Hackers are compromising improperly…

|
Published
Icons - Phone - Fire - SMS - People - Government

Key Takeaways System disruption: The OnSolve CodeRED emergency alert system, used by U.S. municipalities, has been taken offline following a cyberattack. Data breach: User information,…

|
Published
Windscribe Now Offers Free Pro Accounts to Journalists, NGOs; Adds AmneziaWG to Fight VPN Blocks

Free Pro for Journalists/NGOs: Windscribe offers verified reporters and NGOs a free 1-year Pro plan. New AmneziaWG Protocol: Adds stealth WireGuard variant to bypass censorship…

|
Published
EU Council Revises Chat Control Proposal, but Critics Warn of Future Risks

Mandatory Scanning Removed: Council drops compulsory scanning but leaves provisions enabling future surveillance expansion. New Scanning & Blocking: AI-based content checks and state-level blocking systems…

|
Published
cybercrime_report

Key Takeaways Novel attack chain: The RomCom threat group is now using the SocGholish malware delivery framework to deploy its Mythic Agent payload. Target profile:…

|
Published
Worm - Money

Key Takeaways Low-cost access: The latest version, WormGPT 4, is available on underground forums with subscription prices starting at $50 per month and $220 for…

|
Published

Key Takeaways Flaw identified: A high-severity vulnerability, tracked as CVE-2025-59373, has been discovered in the ASUS MyASUS application. Potential Impact: It allows a low-privilege local…

|
Published
Man - Laptop - Office

Key Takeaways Arrest and charges: A 21-year-old Russian cybersecurity entrepreneur has been arrested in Moscow on treason charges. Public criticism: Kilin had publicly criticized the…

|
Published
canon

Key Takeaways Incident confirmation: Canon has confirmed that a subsidiary of Canon U.S.A., Inc., was impacted by the campaign exploiting the Oracle E-Business Suite vulnerability.…

|
Published
Researchers - Holographic Screen

Key Takeaways Advanced simulation: A new red-team tool, SandWorm11-24-25.exe, has been released, replicating the destructive techniques of the GRU Unit 74455 (Sandworm). LotL: The AI-generated…

|
Published

Key Takeaways Botnet connection: Certain Android TV streaming boxes, such as Superbox, require intrusive software that forces the user's network to join a residential proxy…

|
Published

Key Takeaways FCC fine: The FCC has fined Comcast $1.5 million following a data breach at a third-party vendor that exposed customer data. Vendor breach:…

|
Published
AstrillVPN Launches Major Black Friday 2025 Deal 27 Months for $199

Big Discount: AstrillVPN offers 27 months for $199, cutting regular pricing by over 40%. Full Features: Includes high-speed servers, strong encryption, streaming access, and advanced…

|
Published
Surfshark Introduces Multi IP and Upgraded Rotating IP for Enhanced Online Privacy

Enhanced Privacy Tools: Surfshark's Multi IP assigns unique IPs per session to reduce tracking. Automatic IP Rotation: Rotating IP changes addresses every five minutes within…

|
Published
Cybersecurity Job Moves

John Bruce – Quorum CyberJohn Bruce has joined Quorum Cyber as Chief Information Security Officer (CISO), tasked with strengthening the company’s defense operations and strategic…

|
Published on November 24, 2025
robot human

Key Takeaways Autonomous attack: The Chinese state-sponsored group GTG-1002 used an AI agent to autonomously carry out 80-90% of the attack lifecycle. Zero exploit window:…

|
Published on November 24, 2025
mobile shopping

Key Takeaways Malicious domain durge: Researchers identified over 1,700 suspicious and malicious domains registered between September and November 2025. Targeted keywords: Campaigns heavily leverage holiday-specific…

|
Published on November 24, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: