
Hackers Exploit Fake Microsoft Teams Site to Spread Odyssey macOS Stealer
Cybercriminals have escalated their attacks against macOS users by deploying a sophisticated new campaign that…
Lazarus APT Deploys ClickFix Technique to Exfiltrate Sensitive Intelligence Data
The notorious Lazarus APT group, suspected of having Northeast Asian origins and internally tracked as…
Critical Argo CD API Flaw Exposes Repository Credentials to Attackers
A major security flaw has been discovered in Argo CD, a popular open-source tool used…
New GhostAction Attack Compromises 327 GitHub Users and 817 Repositories
Security researchers uncovered a large-scale attack campaign now identified as GhostAction, which compromised secrets belonging to 327…
Wealthsimple Data Breach – User Information Leaked Online
Canadian financial technology company Wealthsimple disclosed a data security incident on September 5, 2025, revealing…
Cybersecurity Landscape 2025 Amid Record Vulnerabilities, Infrastructure Breakdown, and Growing Digital Risks
The year 2025 has unfolded in an environment marked by eroding trust in vulnerability databases,…
10 Best Web Application Penetration Testing Companies In 2025
Securing web applications is a top priority for businesses in 2025 as they’re a primary…
Microsoft Tapped China Engineers for SharePoint Support
A new investigation has revealed that Microsoft relied on China-based engineers to provide technical support…
Over 143,000 Malware Files Target Android and iOS Users in Q2 2025
In the second quarter of 2025, users of Android and iOS devices faced relentless cyberthreats,…
CISA Issues Alert on Android 0-Day Use-After-Free Vulnerability Under Active Exploitation
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert for a newly…