Sequoia Capital Faces Internal Strife Over Partner’s Controversial Social Media Activity Sequoia Capital, a leading venture capital firm, is currently grappling with internal discord following […]
Year: 2025
China-Aligned Cyber Group LongNosedGoblin Exploits Windows Group Policy for Espionage Across Asia and Europe
China-Aligned Cyber Group ‘LongNosedGoblin’ Exploits Windows Group Policy for Espionage A newly identified cyber threat group, dubbed LongNosedGoblin, has been implicated in a series of […]
Critical UEFI Flaw in ASRock, ASUS, GIGABYTE, MSI Boards Allows Early-Boot DMA Attacks
Critical UEFI Vulnerability Exposes ASRock, ASUS, GIGABYTE, and MSI Motherboards to Early-Boot DMA Attacks A significant security vulnerability has been identified in certain motherboard models […]
Nigerian Authorities Arrest Developer of RaccoonO365 Phishing Platform Targeting Microsoft 365 Users
Nigerian Authorities Arrest RaccoonO365 Phishing Developer Behind Microsoft 365 Attacks In a significant crackdown on cybercrime, Nigerian law enforcement has apprehended three individuals implicated in […]
WatchGuard Fireware OS Vulnerability Exploited in Active Attacks; Urgent Patches Released
Critical WatchGuard Fireware OS Vulnerability Under Active Exploitation WatchGuard has recently addressed a critical security flaw in its Fireware OS, identified as CVE-2025-14733, which has […]
Cybercriminals Use Cracked Software, YouTube to Spread CountLoader and GachiLoader Malware
Cybercriminals Exploit Cracked Software and YouTube Videos to Spread CountLoader and GachiLoader Malware Cybersecurity researchers have uncovered a sophisticated campaign leveraging cracked software distribution sites […]
Russian Cyber Operatives Exploit Microsoft 365 Device Code Phishing to Hijack Accounts
Russian Cyber Operatives Exploit Microsoft 365 Device Code Phishing to Hijack Accounts In a sophisticated cyber espionage campaign, a group suspected to be aligned with […]
Amazon Detects North Korean Operative Using Keystroke Delay Analysis in Cybersecurity Breakthrough
Amazon Uncovers North Korean IT Worker Through Keystroke Delay Analysis In a striking revelation, Amazon’s security team identified a North Korean operative masquerading as a […]
China-Aligned APT LongNosedGoblin Exploits Windows Group Policy for Stealthy Malware Attacks
China-Aligned APT Group Exploits Windows Group Policy for Stealthy Malware Deployment A sophisticated cyberespionage campaign has been uncovered, targeting governmental entities across Southeast Asia and […]
University of Sydney Hit by Major Cyberattack, Sensitive Data Compromised
In a significant cybersecurity incident, the University of Sydney has fallen victim to a sophisticated hacking attack, compromising sensitive data and raising serious concerns about […]