Why Non-Human Identity Management is the Next Cybersecurity Frontier
Modern enterprise networks are highly complex environments that rely on hundreds of…
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
A now-patched critical security flaw in the Wazur Server is being exploited…
Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group
Jun 09, 2025Ravie LakshmananGovernment Security / Cyber Espionage The reconnaissance activity targeting…
OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups
OpenAI has revealed that it banned a set of ChatGPT accounts that…
Malicious Browser Extensions Infect Over 700 Users Across Latin America Since Early 2025
Jun 08, 2025Ravie LakshmananMalware / Browser Security Cybersecurity researchers have shed light…
New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally
Cybersecurity researchers have flagged a supply chain attack targeting over a dozen…
Why Business Impact Should Lead the Security Conversation
Security teams face growing demands with more tools, more data, and higher…
Why More Security Leaders Are Selecting AEV
Jun 06, 2025The Hacker NewsCyber Resilience / Penetration Testing Cybersecurity involves both…
Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam
Jun 06, 2025The Hacker NewsCybercrime / Financial Fraud India's Central Bureau of…


