CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
Nov 25, 2025Ravie LakshmananSpyware / Mobile Security The U.S. Cybersecurity and Infrastructure…
Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
Nov 24, 2025Ravie LakshmananCloud Security / Vulnerability Multiple security vendors are sounding…
New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Nov 24, 2025Ravie LakshmananVulnerability / Container Security Cybersecurity researchers have discovered five…
SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
Nov 21, 2025Ravie LakshmananCompliance / Cyber Attack The U.S. Securities and Exchange…
APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
A China-nexus threat actor known as APT24 has been observed using a…
Why IT Admins Choose Samsung for Mobile Security
Nov 21, 2025The Hacker NewsMobile Security / Data Protection Ever wonder how…
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
Nov 22, 2025Ravie LakshmananZero-Day / Software Security The U.S. Cybersecurity and Infrastructure…
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
Nov 22, 2025Ravie LakshmananCyber Espionage / Cloud Security The China-linked advanced persistent…
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Bad actors are leveraging browser notifications as a vector for phishing attacks…


