Mustang Panda is targeting Myanmar with Star Proxy, EDR Bypass and Toneshell updates
China-related threat actors known as Mustang Pandas are attributed to cyberattacks targeting…
Gemini 2.5 Flash: Leading the future of AI with advanced inference and real-time adaptability
Artificial intelligence (AI) is transforming industries, and businesses are competing to profit…
Critical Erlan/OTP SSH vulnerability (CVSS 10.0) allows unrecognized code execution
The Erlang/Open Telecom Platform (OTP) SSH implementation reveals a critical security vulnerability…
Apple patches take advantage of two aggressively exploited iOS flaws used in sophisticated target attacks
On Wednesday, Apple released security updates for iOS, iPados, MacOS Sequoia, TVOS…
Experts reveal four new privilege escalation flaws in Windows Task Scheduler
Cybersecurity researchers detail four different vulnerabilities in the core components of Windows…
Google blocked 5.1B harmful ads and suspended 39.2m ad accounts in 2024
Google announced on Wednesday that it suspended more than 39.2 million ad…
The new BPFDOOR controller allows stealth lateral movement in Linux server attacks
Cybersecurity researchers unearthed a new controller component related to a known backdoor…
A large portion of browser extensions can access sensitive enterprise data, a new report found
We know that browser extensions are embedded in the daily workflows of…
Critical Apache Roller Vulnerability (CVSS 10.0) allows for the persistence of malformed sessions
Apache Roller Open-Source, a Java-based blog server software, reveals a critical security…