Threat actors are evolving the ClickFix attack playbook—and this time, they’re weaponizing a trusted Windows utility: … ClickFix Attack Abuses nslookup.exe for DNS Payload DeliveryRead more
CyberSecurity
China’s Dual Vulnerability Databases Create Disclosure Gaps
Global vulnerability management depends on one core principle: timely disclosure. But new research into China’s dual … China’s Dual Vulnerability Databases Create Disclosure GapsRead more
Chrome 0-Day Vulnerability Actively Exploited in the Wild
A new Chrome 0-day vulnerability is being actively exploited in the wild — and security teams … Chrome 0-Day Vulnerability Actively Exploited in the WildRead more
Fake CAPTCHA Attacks Drive LummaStealer Malware Resurgence
LummaStealer, a notorious information-stealing malware, has resurfaced after a 2025 disruption by law enforcement. This renewed … Fake CAPTCHA Attacks Drive LummaStealer Malware ResurgenceRead more
Google Warns of Hackers Exploiting Gemini AI for Multi-Stage Malware
Google’s Threat Intelligence Group (GTIG) has revealed that threat actors are abusing Gemini AI to automate … Google Warns of Hackers Exploiting Gemini AI for Multi-Stage MalwareRead more
Digital Squatting Attacks: How Lookalike Domains Steal Credentials
In 2025 alone, more than 6,200 adversarial domain name cases were recorded, contributing to a 68% … Digital Squatting Attacks: How Lookalike Domains Steal CredentialsRead more
Arsink RAT: Android Malware Enabling Remote Access & Data Theft
Mobile devices have become prime targets for cybercriminals. In recent threat intelligence reporting, Arsink RAT has … Arsink RAT: Android Malware Enabling Remote Access & Data TheftRead more
Major Gemini Flaw Exposes Your Private Calendar Data
In one of the most striking examples of AI‑driven security failure to date, researchers uncovered a … Major Gemini Flaw Exposes Your Private Calendar DataRead more
Dangerous TP-Link Bug Lets Attackers Seize VIGI Cameras
In early 2026, a major authentication bypass vulnerability surfaced in TP‑Link’s widely deployed VIGI camera series—putting … Dangerous TP-Link Bug Lets Attackers Seize VIGI CamerasRead more
Redmi Buds Security: Bluetooth Flaws, Risks & Enterprise Defenses
The Redmi Buds security story is a wake‑up call for CISOs and security teams: two newly … Redmi Buds Security: Bluetooth Flaws, Risks & Enterprise DefensesRead more