Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
May 09, 2025Ravie LakshmananVulnerability / Industrial Security A China-linked unnamed threat actor…
Security Tools Alone Don’t Protect You — Control Effectiveness Does
61% of security leaders reported suffering a breach due to failed or…
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws
May 07, 2025Ravie LakshmananVulnerability / Web Security A second security flaw impacting…
Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks
May 07, 2025Ravie LakshmananDark Web / Cybercrime Europol has announced the takedown…
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times
May 07, 2025Ravie LakshmananSoftware Supply Chain / Malware Cybersecurity researchers have discovered…
Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet
May 06, 2025Ravie LakshmananInternet of Thing / Vulnerability Threat actors have been…
New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims
Cybersecurity researchers have lifted the lid on two threat actors that orchestrate…
Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence
May 06, 2025Ravie LakshmananCybersecurity / Vulnerability A recently disclosed critical security flaw…
Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi
May 05, 2025Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have disclosed a…


