GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging
Mar 14, 2025Ravie LakshmananMobile Security / Encryption The GSM Association (GSMA) has…
Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal
Mar 15, 2025Ravie Lakshmanan Malware / Supply Chain Security Cybersecurity researchers have…
Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges
Mar 14, 2025Ravie LakshmananCybercrime / Ransomware A 51-year-old dual Russian and Israeli…
North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps
The North Korea-linked threat actor known as ScarCruft is said to have…
Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails
Microsoft has shed light on an ongoing phishing campaign that targeted the…
Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk
Mar 13, 2025Ravie LakshmananOpen Source / Vulnerability Meta has warned that a…
Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack
Mar 12, 2025Ravie LakshmananCloud Security / Vulnerability Threat intelligence firm GreyNoise is…
Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits
Mar 12, 2025Ravie LakshmananCyber Espionage / Vulnerability The China-nexus cyber espionage group…
Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks
Mar 12, 2025Ravie LakshmananEndpoint Security / Vulnerability Apple on Tuesday released a…