TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations
Fri, 05 Sep 2025 19:37:00 +0530
SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild
Fri, 05 Sep 2025 16:29:00 +0530
VirusTotal Finds 44 Undetected SVG Files Used to Deploy Base64-Encoded Phishing Pages
Fri, 05 Sep 2025 11:43:00 +0530
Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
Thu, 04 Sep 2025 23:40:00 +0530
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
Thu, 04 Sep 2025 23:28:00 +0530
Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions
Thu, 04 Sep 2025 15:51:00 +0530
Google Fined $379 Million by French Regulator for Cookie Consent Violations
Thu, 04 Sep 2025 15:39:00 +0530
CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited
Thu, 04 Sep 2025 15:33:00 +0530
Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
Thu, 04 Sep 2025 01:29:00 +0530
Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure
Wed, 03 Sep 2025 17:50:00 +0530
Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack
Wed, 03 Sep 2025 16:35:00 +0530
Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats
Wed, 03 Sep 2025 16:00:00 +0530
AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals
Wed, 03 Sep 2025 15:46:00 +0530
CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation
Wed, 03 Sep 2025 10:39:00 +0530
Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations
Wed, 03 Sep 2025 09:23:00 +0530
Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE
Tue, 02 Sep 2025 22:09:00 +0530
Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control
Tue, 02 Sep 2025 20:26:00 +0530
Ukrainian Network FDN3 Launches Massive Brute-Force Attacks on SSL VPN and RDP Devices
Tue, 02 Sep 2025 16:08:00 +0530
Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware
Tue, 02 Sep 2025 14:09:00 +0530
Share this story
Industry 4.0, the Fourth Industrial Revolution, and 4IR.
LEARN MOREThe key features and benefits of Endpoint Detection and Response (EDR).
LEARN MOREGoogle's global exhibition of inspiration, innovation, and education
LEARN MOREExplore how cutting-edge technologies empower business at the AWS Summit.
LEARN MORELeverage trends, strategies, and predictions to give your business a competitive edge.
LEARN MOREHow to scale from VMs to Kubernetes.
LEARN MORELet us know what you think about the article.