See Threats to Your Industry & Country in Real Time
Modern security teams often feel like they're driving through fog with failing…
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
Dec 16, 2025Ravie LakshmananMalware / Threat Detection An ongoing campaign has been…
How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?
Dec 08, 2025The Hacker NewsCybersecurity / Password Security The holiday season compresses…
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details…
Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
Dec 05, 2025Ravie LakshmananVulnerability / Software Security Two hacking groups with ties…
Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
Dec 06, 2025Ravie LakshmananVulnerability / Patch Management The U.S. Cybersecurity and Infrastructure…
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
Nov 30, 2025Ravie LakshmananHacktivism / Vulnerability The U.S. Cybersecurity and Infrastructure Security…
Gainsight Expands Impacted Customer List Following Salesforce Security Alert
Nov 27, 2025Ravie LakshmananRansomware / Cloud Security Gainsight has disclosed that the…
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
Nov 22, 2025Ravie LakshmananCyber Espionage / Cloud Security The China-linked advanced persistent…


