loader image
Microsoft Patches 2 Zero-Days, 79 Flaws

In its latest software update, Microsoft patches 2 zero-days as part of the March 2026 Patch Tuesday. This initiative addresses a total of 79 security vulnerabilities, marking a significant effort to enhance cybersecurity. The patch release includes fixes for two publicly disclosed zero-day vulnerabilities, among other issues, underscoring Microsoft’s ongoing commitment to fortifying its products […]

Android Malware Hits Pix Payments, Banks, Crypto

A wave of cyber threats has emerged as six Android malware families target Pix payments, banking apps, and cryptocurrency wallets. Cybersecurity experts have identified these new malicious software variants, which infiltrate devices to siphon critical data and orchestrate financial fraud. Among these threats are traditional banking trojans such as PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and […]

Infostealers Fuel Agentic Attack Chains

Infostealers fuel agentic attack chains as cybercriminals in 2025 turned to automation, significantly advancing their operations. Instead of relying on isolated incidents, attackers developed systems capable of executing complete intrusion cycles with little need for human intervention. According to data from criminal forums, this shift has empowered cybercriminals to operate more efficiently and on a […]

Middle East Cyber Escalation Targets West

The Middle East is witnessing a notable surge in cyber escalation, marked by retaliatory digital attacks. A recent report from Rapid7 Labs details heightened activities targeting both regional and Western infrastructure, driven by state-directed espionage and underlying motives of disruption and deception. Key vulnerabilities exploited in these operations include CVE-2026-21514, CVE-2026-1281, and CVE-2025-52691, among others. […]

Stryker Goes Offline After Iran-Linked Wiper

Stryker goes offline following a crippling cyberattack linked to the Iranian-affiliated hacktivist group, Handala. This disruption resulted from a wiper malware assault, leaving the leading medical technology company struggling with operational downtime. The attack has raised concerns about cybersecurity vulnerabilities within the healthcare sector, a critical infrastructure area. Handala, known for supporting Palestinian causes, claimed […]

SocksEscort Proxy Takedown Hits 360,000 Devices

In a decisive move against cybercrime, law enforcement agencies from the United States and Europe successfully executed a socksescort proxy takedown, crippling a service linked to the notorious AVrecon botnet. Since 2020, this illicit service has infiltrated approximately 360,000 devices, demonstrating a significant threat to online security. Collaborative efforts between these agencies aimed to dismantle […]

Stryker Hit by Suspected Iran-linked Cyberattack

Medical technology giant Stryker was hit by a cyberattack believed to be linked to Iran, escalating concerns amid ongoing Middle East tensions. The attack underscores the vulnerability of the healthcare industry to cyber threats, magnifying the risks that geopolitical strife poses to multinational corporations. Stryker, a key player in medical tech, could face significant operational […]

AppArmor Flaws Expose Millions of Linux Servers

The recent discovery of critical AppArmor flaws exposes Linux servers to alarming risks, affecting over 12.6 million enterprise systems worldwide. Originating from vulnerabilities collectively termed “CrackArmor,” these security weaknesses allow unprivileged users to escalate privileges to root, compromising container isolation and causing kernel crashes. These issues trace back to the Linux kernel version 4.11, yet […]

Meta Deploys Advanced Anti-Scam Tools on WhatsApp

Meta deploys advanced tools across WhatsApp, Facebook, and Messenger to combat the increasing prevalence of online scams. These new anti-scam defenses incorporate artificial intelligence and behavioral alerts, working in tandem with global law enforcement to proactively shield users. Meta introduces specific warning mechanisms to avert interactions with malicious actors. On WhatsApp, behavioral alerts identify suspicious […]

XWorm 7.1, Remcos RAT Abuse Windows Tools

Cybersecurity threats are evolving with new variations like xworm 7.1 and Remcos RAT employing advanced techniques to infiltrate systems. These cyber tools exploit legitimate Windows utilities to bypass security measures, enabling attackers to deploy fileless attacks. Security professionals are observing an increasing pattern where such threats manipulate built-in Windows components, making detection and prevention significantly […]

Poland Says Nuclear Lab Hit, Iran Suspected

Poland says its nuclear lab experienced a hacking attempt, with initial evidence revealing potential Iranian involvement. However, officials warn that it might serve as a deceptive maneuver, a false flag aimed at misleading investigators. The security breach targeted the country’s nuclear research infrastructure, raising concerns about the susceptibility of critical facilities. Cybersecurity experts are diligently […]

Google Looker Studio Flaw Let Attackers Steal Data

Google Looker Studio experienced a significant flaw, dubbed “LeakyLooker,” revealing vulnerabilities that allowed attackers to exfiltrate data from Google services. Researchers identified these as a set of nine cross-tenant vulnerabilities within the platform, enabling malicious actors to execute SQL queries, alter data, or even delete records across Google Cloud without user consent. The flaw stemmed […]