Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers
May 01, 2025Ravie LakshmananMalware / Web Skimming Cybersecurity researchers have shed light…
SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models
May 01, 2025Ravie LakshmananVulnerability / VPN Security SonicWall has revealed that two…
Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense
Apr 30, 2025Ravie LakshmananArtificial Intelligence / Email Security As the field of…
New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems
Various generative artificial intelligence (GenAI) services have been found vulnerable to two…
WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy
Apr 29, 2025Ravie LakshmananArtificial Intelligence / Data Protection Popular messaging app WhatsApp…
Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool
Apr 29, 2025Ravie LakshmananCybersecurity / Malware In a new campaign detected in…
Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised
Apr 28, 2025Ravie LakshmananWeb Application Security / Vulnerability Threat actors have been…
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
Apr 25, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers are warning about…


