UK Government Proposes Mandatory Ransomware Reporting to Disrupt Threat Actors
In a bold move to combat cybercrime, the UK government has unveiled a new proposal [...]
Jul
Cybercriminals Leverage AI Chatbot to Automate Ransomware Negotiations
In a concerning evolution of ransomware tactics, a newly rebranded ransomware-as-a-service (RaaS) operation known as [...]
Jul
Dell Responds to Alleged Data Leak: Claims Leaked Files Are Not Real
Dell Technologies has confirmed that one of its environments was accessed by threat actors, but [...]
Jul
Helmholz REX 100 Industrial Routers Found Vulnerable to Remote Attacks: Critical Flaws Patched
A new wave of industrial cybersecurity concerns has emerged following the discovery of eight security [...]
Jul
Ring Camera “Hack” Claims Spark Concerns — But Amazon Blames a Backend Bug
In recent days, numerous Amazon Ring users have taken to platforms like TikTok, Reddit, and [...]
Jul
Phishing Attack Compromises Maintainer Credentials, Injects Malware into Popular npm Packages
A recent software supply chain attack has raised alarms in the cybersecurity community, after threat [...]
Jul
New Zero-Day Vulnerability in Microsoft SharePoint Actively Exploited in Widespread Attacks
A critical vulnerability recently discovered in Microsoft SharePoint is being actively exploited, prompting urgent alerts [...]
Jul
Malware Campaign Targets US Accounting Firm Using New Crypter “Ghost Crypt”
In May 2025, a sophisticated malware campaign targeted a U.S.-based accounting firm, delivering the PureRAT [...]
Jul
Iranian APT MuddyWater Deploys New Versions of DCHSpy Android Spyware Amid Israel Conflict
The ongoing geopolitical tension between Iran and Israel has sparked a new wave of cyber [...]
Jul
Hackers Exploit Critical Flaw in Signal Clone TeleMessage to Target Sensitive Data
Cybersecurity researchers and U.S. government officials are raising alarms over a growing wave of attacks [...]
Jul