Cybersecurity
-
1Password Addresses Critical AI Browser Agent Security Gap
Source: Dark ReadingRead more: 1Password Addresses Critical AI Browser Agent Security Gap1Password aims to address security vulnerabilities associated with AI browser agents used in enterprises. The rise of these agents brings…
-
Hackers Exploiting Zero-Day in Gladinet File Sharing Software
Source: BleepingComputerRead more: Hackers Exploiting Zero-Day in Gladinet File Sharing SoftwareThreat actors are actively exploiting a zero-day vulnerability identified as CVE-2025-11371 in Gladinet CentreStack and Triofox products. This vulnerability allows…
-
Russian Spyware ClayRat Spreading Quickly
Source: CyberScoopRead more: Russian Spyware ClayRat Spreading QuicklyZimperium researchers have reported the rapid spread of ClayRat, an Android spyware, across Russia, camouflaged as popular apps. It poses…
-
Dems introduce bill to halt mass voter roll purges
Source: CyberScoopRead more: Dems introduce bill to halt mass voter roll purgesDemocrats have proposed legislation to prevent states from mass purging voters under questionable circumstances. The Voter Purge Protection Act raises…
-
Apple Expands Bug Bounty Program
Source: BleepingComputerRead more: Apple Expands Bug Bounty ProgramApple has announced significant changes to its bug bounty program, doubling maximum payouts and adding new research categories. The program…
-
Ransomware in Manufacturing
Source: Dark ReadingRead more: Ransomware in ManufacturingRansomware gangs increasingly target the manufacturing sector, prompting companies to enhance their security measures. Key among these measures is the…
-
Massive DDoS Attacks from Aisuru Botnet
Source: Krebs on SecurityRead more: Massive DDoS Attacks from Aisuru BotnetThe Aisuru botnet, drawing power from compromised IoT devices in the U.S., has executed record-breaking DDoS attacks, surpassing 29 Tbps.…
-
ShinyHunters Feds Shut Down Salesforce Extortion Site
Source: Dark ReadingRead more: ShinyHunters Feds Shut Down Salesforce Extortion SiteThe ShinyHunters group continues to issue extortion threats against Salesforce victims even after law enforcement has shuttered their site. Imminent…
-
Stealit Malware Campaign Exploiting Node.js
Source: The Hacker NewsRead more: Stealit Malware Campaign Exploiting Node.jsCybersecurity researchers have revealed details about the Stealit malware campaign that utilizes Node.js’ SEA feature to distribute its payloads. This…
-
Chinese Hackers Abuse Velociraptor IR Tool in Ransomware Attacks
Source: Dark ReadingRead more: Chinese Hackers Abuse Velociraptor IR Tool in Ransomware AttacksThe Storm-2603 threat group is utilizing the Velociraptor digital forensics and incident response tool to achieve persistent access to victim…









