State Duma Deputy Alexander Gorelkin has declared that the messaging platform WhatsApp should “begin preparing to exit the Russian market.” According to him, the service—owned by Meta, a company designated as extremist within Russia—is...
In April 2025, cybersecurity experts from Cisco Talos uncovered a new threat vector: cybercriminals exploiting public repositories on GitHub to host malicious payloads used in distributing the Amadey trojan. According to researchers, the creation...
The cryptocurrency exchange BigONE has fallen victim to a cyberattack that resulted in the theft of digital assets valued at $27 million. The breach occurred during the night of July 16, when the platform’s...
Google has filed a lawsuit against the unidentified operators of the malicious botnet BadBox 2.0, accusing them of orchestrating a large-scale advertising fraud scheme that directly targeted the company’s own platforms. According to the...
Google continues to advance Gmail at a vigorous pace, introducing new features enhanced by artificial intelligence. These updates undoubtedly improve user convenience, yet they also force individuals to confront an increasingly difficult trade-off between...
NativeDump allows to dump the lsass process using only NTAPIs generating a Minidump file with only the streams needed to be parsed by tools like Mimikatz or Pypykatz (SystemInfo, ModuleList and Memory64List Streams). NTOpenProcessToken...
Intel has officially announced the discontinuation of Clear Linux—one of the most high-performing and innovative Linux distributions in recent years. This decision comes as part of the company’s broader cost-cutting initiative. Designed from the...
The Akira ransomware group has intensified its operations, adding data from 12 new companies to its dark web leak portal within just three days—from July 15 to 17, 2025. This surge in attacks targeted...
Researchers at VulnCheck have uncovered a new malicious campaign exploiting the CVE-2021-41773 vulnerability in Apache HTTP Server version 2.4.49. This flaw enables remote code execution by bypassing path traversal protections, allowing attackers to access...
A groundbreaking object-manipulation technology, inspired by the biomechanics of geckos and octopuses, has successfully completed trials aboard the International Space Station and returned to Earth. Developed by the Wisconsin-based American startup Kall Morris Inc.,...
Cisco has issued an updated advisory regarding a critical vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products. This flaw enables remote attackers to execute arbitrary code on the...
SubHunterX is a powerful bug bounty automation framework designed to silently map attack surfaces and uncover critical vulnerabilities. By combining military-grade reconnaissance techniques with intelligent automation, SubHunterX gives security professionals the edge in identifying...
A newly discovered version of the SquidLoader malware has surfaced during a targeted attack on institutions in Hong Kong, sparking significant concern within the financial sector. Of particular alarm is its near-complete evasion of...
Microsoft has begun rolling out an update to the Copilot app for Windows, significantly enhancing its artificial intelligence capabilities through the introduction of the Desktop Share feature. With this update, Copilot can now “see”...
Attacks targeting outdated SonicWall SMA 100 devices have once again exposed the fragility of network perimeters often overlooked by conventional security systems. According to the Google Threat Intelligence Group (GTIG), a targeted campaign employing...
The latest iteration of the Matanbuchus malware loader, designated version 3.0, has drawn particular scrutiny from cybersecurity experts due to its significant enhancements aimed at evading detection and bypassing modern defensive systems. Originally introduced...