Imagine scrolling through your phone’s news feed and clicking on what looks like a legitimate headline—only … Pushpaganda Attack: AI Abuse of Google Discover for MalwareRead more
1,250+ C2 Servers in Russian Hosting: A Growing Cyber Threat
In just 90 days, cybersecurity researchers uncovered over 1,250 active command-and-control (C2) servers embedded across Russia’s … 1,250+ C2 Servers in Russian Hosting: A Growing Cyber ThreatRead more
Fake Adobe Reader Download Attack: In-Memory ScreenConnect Threat
Cybercriminals no longer rely on noisy malware to breach systems—they’re going stealth. In early 2026, researchers … Fake Adobe Reader Download Attack: In-Memory ScreenConnect ThreatRead more
Microsoft 365 Mailbox Rules Abused in Email Attacks
Cybercriminals are increasingly abusing Microsoft 365 mailbox rules as a stealth persistence mechanism to silently monitor, … Microsoft 365 Mailbox Rules Abused in Email AttacksRead more
Hidden Backdoor in Trusted WordPress Plugins Powers 8-Month Supply Chain Attack
A highly sophisticated WordPress supply chain attack has exposed a critical weakness in how plugin ecosystems … Hidden Backdoor in Trusted WordPress Plugins Powers 8-Month Supply Chain AttackRead more
Google Cloud Phishing Attack Spreads Remcos RAT
Cybercriminals are increasingly abusing trusted cloud platforms, and a new campaign demonstrates just how dangerous this … Google Cloud Phishing Attack Spreads Remcos RATRead more
MuddyWater Hackers Launch Massive 12K-System Cyber Scan
A MuddyWater-style cyber campaign has been observed conducting large-scale reconnaissance across more than 12,000 internet-exposed systems … MuddyWater Hackers Launch Massive 12K-System Cyber ScanRead more
Adobe Acrobat Reader Vulnerabilities: Critical Code Execution Risks and Security Patch Guidance
Adobe Acrobat Reader vulnerabilities continue to represent a high-impact attack surface for enterprises and end users … Adobe Acrobat Reader Vulnerabilities: Critical Code Execution Risks and Security Patch GuidanceRead more
PHP Composer Vulnerability Exposes Developers to Command Injection Attacks
The recent PHP Composer vulnerability has raised serious concerns across the global development and DevSecOps community. … PHP Composer Vulnerability Exposes Developers to Command Injection AttacksRead more
Windows Active Directory Vulnerability Allows Remote Code Execution
Active Directory remains the backbone of enterprise identity and access management—and a prime target for attackers … Windows Active Directory Vulnerability Allows Remote Code ExecutionRead more