Cyber Security
“`html Trendyol’s application security division discovered a sequence of bypass methods that make Meta’s Llama Firewall protections ineffective against advanced prompt injection assaults. The results prompt renewed worries regarding the effectiveness of current...
Cyber Security
“`html State-sponsored threat actors from Iran have amplified their cyber offensives against essential infrastructure in the United States, witnessing a staggering 133% rise in malicious activity documented during May and June 2025. This intensification aligns...
Cyber Security
“`html A complex new variant of the macOS.ZuRu malware has arisen, aiming at macOS users via a compromised iteration of the widely-used Termius SSH client. This new version, uncovered in late May 2025, signifies a significant advancement in the tactics of threat...
Cyber Security
“`html Remote surveillance and management (RMM) instruments are essential for IT squads, but that same efficiency renders them a favored tactic for attackers as well. During the initial half of 2025, ANY.RUN investigators examined numerous real-world malware...
Cyber Security
“`html Microsoft has deployed its most recent cumulative update for Windows 10, versions 21H2 and 22H2, along with Windows 10 Enterprise LTSC 2021 and Windows 10 IoT Enterprise LTSC 2021. This update, designated as KB5062554 (OS Builds 19044.6093 and...
Cyber Security
“`html Officers from the Russian Federal Security Service (FSB) have apprehended two hackers in Siberia who executed cyber incursions on critical infrastructure sites at the behest of Ukrainian intelligence agencies. The concurrent detentions in the Kemerovo and...
Cyber Security
“`html Significant vulnerability in Citrix NetScaler devices mirrors the notorious 2023 security incident that incapacitated major enterprises globally. The newly discovered critical flaw in Citrix NetScaler devices has cybersecurity professionals alerting about...
Cyber Security
“`html A significant security flaw has been identified within HIKVISION’s applyCT component, part of the HikCentral Integrated Security Management Platform, enabling attackers to execute arbitrary code remotely without the need for authentication. Designated...
Cyber Security
“`html The .COM top-level domain persistently leads the cybercriminal realm as the primary medium for hosting credential phishing sites, sustaining its status as the most frequently exploited TLD by threat actors globally. Recent insights reveal that malicious...
Cyber Security
“`html The intensifying hostilities between Iran and Israel have incited an extraordinary increase in hacktivist cyber operations, with more than 80 separate collectives executing synchronized attacks across 18 essential infrastructure domains. In response to...