
Google Avoids Chrome Breakup but Must Share Search Data With Competitors
The U.S. District Court for the District of Columbia today imposed landmark remedies in the…
Apache DolphinScheduler Vulnerability Patched — Update Immediately
A low-severity security issue in Apache DolphinScheduler has been addressed in the latest release. Identified…
Dire Wolf Ransomware Targets Windows, Wipes Logs and Backups
The recently emerged DireWolf ransomware group has launched a sophisticated new campaign targeting Windows systems…
Over 1,100 Ollama AI Servers Found Online, 20% at Risk
More than 1,100 instances of Ollama—a popular framework for running large language models (LLMs) locally—were…
CISA Alerts on Critical SunPower Vulnerability Allowing Full Device Takeover
The Cybersecurity and Infrastructure Security Agency (CISA) yesterday issued a high-severity alert (ICSA-25-245-03) regarding a…
BruteForceAI Tool Automates Login Page Detection and Attacks
A cutting-edge penetration testing tool called BruteForceAI has arrived, bringing automation and artificial intelligence to the art…
Google Cloud & Cloudflare Missed 3-Year Phishing Campaign
An industrial-scale phishing campaign exploiting Google Cloud and Cloudflare infrastructure operated in plain sight for…
Jaguar Land Rover Confirms Cyberattack Disrupting Global IT Systems
Jaguar Land Rover (JLR), the UK’s leading luxury automotive manufacturer, has disclosed that it is…
Devices Exploited for Instant DDoS Attacks
A newly uncovered variant of the notorious RapperBot malware is covertly commandeering internet-connected devices—particularly outdated…
Stealthy Python Malware Uses Discord to Steal Windows Data
Inf0s3c Stealer, a stealthy Python-based grabber built to harvest system information and user data from…