
Akira Ransomware Uses Windows Drivers to Bypass AV/EDR in SonicWall Attacks
Security researchers have identified a sophisticated new tactic employed by Akira ransomware operators, who are…
Threat Actors Poison Bing Search Results to Distribute Bumblebee Malware via ‘ManageEngine OpManager’ Queries
Threat actors leveraged SEO poisoning techniques to manipulate Bing search results, directing users querying for…
Chinese Hackers Exploit SharePoint Flaws to Deploy Backdoors, Ransomware, and Loaders
Unit 42 researchers have identified significant overlaps between Microsoft’s reported ToolShell exploit chain targeting SharePoint…
Chinese Hackers Breach Exposes 115 Million U.S. Payment Cards
Security researchers have uncovered a highly advanced network of Chinese-speaking cybercriminal syndicates orchestrating smishing attacks…
New OpenAI Free GPT-OSS Models Outperforms DeepSeek’s R1
OpenAI has launched two new open-weight language models, gpt-oss-120b and gpt-oss-20b, in a shift that…
Adobe AEM Forms 0-Day Vulnerability Allows Attackers to Run Arbitrary Code
Adobe has released critical security updates for Adobe Experience Manager (AEM) Forms on Java Enterprise…
Trend Micro Apex One Hit by Actively Exploited RCE Vulnerability
Trend Micro has issued an urgent security bulletin warning customers of critical remote code execution…
Top 10 Best IT Asset Management Tools in 2025
In today’s fast-paced digital landscape, effective IT Asset Management (ITAM) is crucial for organizations to…
Threat Actors Weaponizing RMM Tools to Gain System Control and Exfiltrate Data
Adversaries are using Remote Monitoring and Management (RMM) tools more frequently as dual-purpose weapons for…
MCPoison Attack Abuses Cursor IDE to Run Arbitrary System Commands
Cybersecurity researchers have uncovered a critical vulnerability in Cursor IDE that allows attackers to execute…