Ivanti VPNs are still exposed to attacks exploiting a recent vulnerability tracked as CVE-2025-0282 and Nominet has been ...
Attackers are exploiting a critical vulnerability in Aviatrix Controller to execute arbitrary code in AWS cloud environments.
A threat actor has been observed abusing compromised AWS keys to encrypt data in S3 buckets and demand a ransom payment in exchange for the encryption keys, cybersecurity firm Halcyon reports. As part ...
According to a whitepaper from Redmond’s AI red team, tools like its open source PyRIT (Python Risk Identification Toolkit) ...
A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware.
Infostealer malware allowed threat actors to compromise Telefonica employees’ credentials and access the company’s internal ticketing system.
The US Justice Department has announced charges against three Russians for operating the Blender and Sinbad cryptocurrency mixers.
Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack.
Juniper Networks has patched multiple high-severity vulnerabilities in Junos OS and its third-party components.
Developed with the help of AI, the emerging FunkSec ransomware claimed over 80 victims in December 2024. An emerging ransomware group named FunkSec has risen to fame after claiming responsibility for ...
Microsoft has released fixes for high-severity flaws in Azure SaaS Resources and Purview (no user action required), while ...
Ivanti confirms zero-day exploitation of a remotely exploitable code execution vulnerability (CVE-2025-0282) in its Connect ...