Article Title: CISA Identifies Critical ASUS Live Update Vulnerability Amid Active Exploitation The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a significant […]
Year: 2025
Kimsuky Uses QR Code Phishing to Spread DocSwap Android Malware in New Campaign
Kimsuky’s New Tactic: Spreading DocSwap Android Malware via QR Code Phishing The North Korean cyber espionage group known as Kimsuky has launched a sophisticated campaign […]
Dynamic AI-SaaS Security Essential as AI Sprawl Challenges Traditional Governance
Securing the Future: The Imperative for Dynamic AI-SaaS Security in the Age of Copilots In the rapidly evolving digital landscape, artificial intelligence (AI) copilots and […]
North Korean Hackers Steal $2.02 Billion in 2025 Crypto Heists, Marking 51% Increase from Previous Year
North Korean Hackers Escalate Global Crypto Theft to $2.02 Billion in 2025 In 2025, cybercriminals linked to North Korea have significantly intensified their illicit activities, […]
Sophisticated Cyber Attacks Exploit WhatsApp; New Hijacking Tactics, Malware, and Spyware Uncovered
Emerging Threats: WhatsApp Hijacks and Advanced Cyber Attacks In the ever-evolving landscape of cybersecurity, recent developments have unveiled sophisticated methods employed by cybercriminals to exploit […]
Critical HPE OneView Vulnerability Allows Remote Code Execution; Urgent Patch Required for Versions Prior to 11.00
Critical HPE OneView Vulnerability Exposes Systems to Remote Code Execution Hewlett Packard Enterprise (HPE) has recently addressed a critical security vulnerability in its OneView software, […]
China-Linked ‘LongNosedGoblin’ Cyber Espionage Targets Southeast Asia and Japan
LongNosedGoblin: Unveiling China’s Covert Cyber Espionage Tactics in Southeast Asia A newly identified cyber threat group, dubbed LongNosedGoblin, has been implicated in a series of […]
Phantom Stealer 3.5: New Malware Threat Targets User Data with Advanced Evasion Techniques
Phantom Stealer 3.5: A Sophisticated Threat to User Data Security In the ever-evolving landscape of cyber threats, Phantom Stealer version 3.5 has emerged as a […]
Chinese Cyber Espionage Group Ink Dragon Expands into European Government Networks
Chinese Espionage Group ‘Ink Dragon’ Expands Operations into European Government Networks The Chinese state-sponsored cyber espionage group known as Ink Dragon has significantly broadened its […]
Hackers Exploit VNC Flaws to Compromise Critical Infrastructure; U.S. and Allies Issue Urgent Advisory
Hackers Exploit VNC Vulnerabilities to Infiltrate Critical Infrastructure In a recent development, cybersecurity agencies from the United States and allied nations have issued a critical […]