From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
A China-linked threat actor has been attributed to a cyber attack targeting…
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
Nov 05, 2025Ravie LakshmananArtificial Intelligence / Threat Intelligence Google on Wednesday said…
CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
Oct 31, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure…
China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
Oct 31, 2025Ravie LakshmananEndpoint Security / Cyber Espionage The exploitation of a…
ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
Nov 01, 2025Ravie LakshmananArtificial Intelligence / Vulnerability The Australian Signals Directorate (ASD)…
China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
Oct 31, 2025Ravie LakshmananMalware / Threat Intelligence A China-affiliated threat actor known…
Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
Google on Thursday revealed that the scam defenses built into Android safeguard…
Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water…
$176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More
Oct 23, 2025Ravie LakshmananCybersecurity / Hacking News Criminals don’t need to be…


