Why IT Admins Choose Samsung for Mobile Security
Nov 21, 2025The Hacker NewsMobile Security / Data Protection Ever wonder how…
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
Nov 22, 2025Ravie LakshmananZero-Day / Software Security The U.S. Cybersecurity and Infrastructure…
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
Nov 22, 2025Ravie LakshmananCyber Espionage / Cloud Security The China-linked advanced persistent…
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are leveraging browser notifications as a vector for phishing attacks…
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security
Nov 21, 2025Ravie LakshmananData Protection / Technology In a surprise move, Google…
Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
Nov 21, 2025Ravie LakshmananVulnerability / Threat Mitigation Grafana has released security updates…
Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
Nov 21, 2025Ravie LakshmananData Breach / SaaS Security Salesforce has warned of…
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
Nov 20, 2025Ravie LakshmananVulnerability / Cloud Computing Oligo Security has warned of…
CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat
Nov 20, 2025The Hacker NewsOnline Fraud / Web Security CTM360 has identified…


