Europol Dismantles 27 DDoS Attack Platforms Across 15 Nations; Admins Arrested

A global law enforcement operation has failed 27 stresser services that were used to conduct distributed denial-of-service (DDoS) attacks and took them offline as...

Microsoft, Google, WhatsApp vs Cyber Moneymakers, and Your Cyber Security

Earlier this week, Tom Burt, corporate vice president of ‘customer security and trust’ at Microsoft, published a blog post expressing the company’s support towards...

PhoneInfoga – Advanced information gathering & OSINT framework

PhoneInfoga is one of the most exceptional devices to filter worldwide telephone numbers utilizing just free assets. The objective is to initially assemble standard...

New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT

Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial remote access trojan known as Remcos RAT...

Wing Security SaaS Pulse: Continuous Security & Actionable Insights — For Free

Designed to be more than a one-time assessment— Wing Security's SaaS Pulse provides organizations with actionable insights and continuous oversight into their SaaS security...

LottieFiles Issues Warning About Compromised “lottie-player” npm Package

LottieFiles has revealed that its npm package "lottie-player" was compromised as part of a supply chain attack, prompting it to release an updated version...

GenAI: A New Headache for SaaS Security Teams

The introduction of Open AI's ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022 release....

Google’s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities

Google has released its monthly Android Security Bulletin for March 2025 to address a total of 44 vulnerabilities, including two that it said have...

Manchester United Football Club hit with a Security Breach

European football club Manchester United opened up on late Friday a cybersecurity incident that disturbed their internal systems. The football club said that they are...

Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

Cybercriminals are increasingly leveraging legitimate HTTP client tools to facilitate account takeover (ATO) attacks on Microsoft 365 environments.Enterprise security company Proofpoint said it observed...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts