Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware
Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign
159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure
Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals
Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely
WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads
DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack
Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign
Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices