Asian Cyber Espionage Campaign Breached 37 Countries
Image: DC_Studio (Envato) A sprawling cyber espionage campaign linked to an Asian state-aligned hacking group has compromised government agencies and...
Image: DC_Studio (Envato) A sprawling cyber espionage campaign linked to an Asian state-aligned hacking group has compromised government agencies and...
Record-breaking 31.4 Tbps DDoS attack hits in November 2025, stopped by Cloudflare Pierluigi Paganini February 06, 2026 AISURU/Kimwolf botnet hit...
Microsoft has released LiteBox, an experimental open-source library OS designed to sandbox applications while reducing their exposure to host systems....
Ravie LakshmananFeb 06, 2026Malware / IoT Security Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework...
Ravie LakshmananFeb 06, 2026Federal Security / Infrastructure Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered Federal Civilian...
Image: Ed Hardie/Unsplash In a new Windows 11 Insider Preview release, Microsoft has started rolling out native support for System...
There is a time window for every act of online fraud. When a transaction occurs, a fraud system must review...
Tax season creates a rare and dangerous overlap: Americans are sharing their most sensitive personal information at the exact moment...
Nearly 5 Million Web Servers Found Exposing Git Metadata – Study Reveals Widespread Risk of Code and Credential Leaks Pierluigi...
U.S. CISA adds SmarterTools SmarterMail and React Native Community CLI flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February...
Ravie LakshmananFeb 06, 2026Cyber Espionage / Malware A previously undocumented cyber espionage group operating from Asia broke into the networks...
As you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat...
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index...
Humans remain the most vulnerable component of security, despite the rapid advancements in cyber defenses. The majority of breaches are still caused by human behavior, as per recent studies and professional predictions. According to Gartner, human error...
From a security perspective, the Super Bowl isn’t a football game. It’s a live-fire exercise.For a few hours, one physical...