Technology

Mustang Panda is targeting Myanmar with Star Proxy, EDR Bypass and Toneshell updates

China-related threat actors known as Mustang Pandas are attributed to cyberattacks targeting…

6 Min Read

Gemini 2.5 Flash: Leading the future of AI with advanced inference and real-time adaptability

Artificial intelligence (AI) is transforming industries, and businesses are competing to profit…

10 Min Read

Critical Erlan/OTP SSH vulnerability (CVSS 10.0) allows unrecognized code execution

The Erlang/Open Telecom Platform (OTP) SSH implementation reveals a critical security vulnerability…

2 Min Read

Apple patches take advantage of two aggressively exploited iOS flaws used in sophisticated target attacks

On Wednesday, Apple released security updates for iOS, iPados, MacOS Sequoia, TVOS…

3 Min Read

Experts reveal four new privilege escalation flaws in Windows Task Scheduler

Cybersecurity researchers detail four different vulnerabilities in the core components of Windows…

3 Min Read

Google blocked 5.1B harmful ads and suspended 39.2m ad accounts in 2024

Google announced on Wednesday that it suspended more than 39.2 million ad…

2 Min Read

The new BPFDOOR controller allows stealth lateral movement in Linux server attacks

Cybersecurity researchers unearthed a new controller component related to a known backdoor…

4 Min Read

A large portion of browser extensions can access sensitive enterprise data, a new report found

We know that browser extensions are embedded in the daily workflows of…

5 Min Read

Critical Apache Roller Vulnerability (CVSS 10.0) allows for the persistence of malformed sessions

Apache Roller Open-Source, a Java-based blog server software, reveals a critical security…

2 Min Read