-

DanaBot malware operators exposed via C2 bug added in 2022
DanaBot malware operators exposed via C2 bug added in 2022 A vulnerability in the DanaBot malware operation introduced in June 2022…
-
Ransomware: Not Just a Corporate Problem Anymore
When most people hear the word “ransomware,” they think of headlines about hospitals or global tech firms locked out of…
-

Ivanti Workspace Control hardcoded key flaws expose SQL credentials
Ivanti Workspace Control hardcoded key flaws expose SQL credentials Ivanti has released security updates to fix three high-severity hardcoded key…
-

Over 84,000 Roundcube instances vulnerable to actively exploited flaw
Over 84,000 Roundcube instances vulnerable to actively exploited flaw Over 84,000 Roundcube webmail installations are vulnerable to CVE-2025-49113, a critical…
-

Sensata Technologies says personal data stolen by ransomware gang
Sensata Technologies says personal data stolen by ransomware gang Sensata Technologies is warning former and current employees it suffered a…
-
Cyberstalking: What It Is and How to Protect Yourself Online
It often starts subtly—an unexpected friend request, repeated messages from someone you barely know, or a comment that reveals more…
-

New Mirai botnet infect TBK DVR devices via command injection flaw
New Mirai botnet infect TBK DVR devices via command injection flaw A new variant of the Mirai malware botnet is…
-
My Account Was Hacked!” – First Steps to Take After a Breach
The sinking feeling hits you: your email password doesn’t work, or you’re locked out of your Instagram account. Worse, your…
-

Proxy Services Feast on Ukraine’s IP Address Exodus
Proxy Services Feast on Ukraine’s IP Address Exodus Image: Mark Rademaker, via Shutterstock. Ukraine has seen nearly one-fifth of its…
-
The Anatomy of a Phishing Attack: How to Spot and Avoid a Scam
You open your email and see a message from your bank urging you to “verify your account immediately to avoid…
