Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
Jul 03, 2025Ravie LakshmananVulnerability / Network Security Cisco has released security updates…
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
Jul 03, 2025Ravie LakshmananThreat Intelligence / Vulnerability The French cybersecurity agency on…
The Hidden Weaknesses in AI SOC Tools that No One Talks About
If you're evaluating AI-powered SOC platforms, you've likely seen bold claims: faster…
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat
Jul 02, 2025The Hacker NewsNetwork Security / Threat Detection With nearly 80%…
Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale
Jul 02, 2025Ravie LakshmananAI Security / Phishing Unknown threat actors have been…
MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted
Jun 27, 2025Ravie LakshmananNetwork Security / Vulnerability Threat intelligence firm GreyNoise is…
PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack
Jun 27, 2025Ravie LakshmananVulnerability / Cyber Espionage A China-linked threat actor known…
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks
Jun 26, 2025Ravie LakshmananCyber Espionage / Malware An Iranian state-sponsored hacking group…
Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign
Jun 19, 2025Ravie LakshmananEmail Security / Identity Protection Threat actors with suspected…


