Home Security News

Security News

Explore our Security News category for up-to-the-minute updates on cybersecurity developments. From the latest data breaches and ransomware attacks to advancements in security technology, we bring you the news that matters most.

Our in-depth articles provide expert analysis of global threats, industry trends, and best practices to help safeguard your digital life. Stay informed with our weekly summaries or subscribe to Security Alerts for breaking news straight to your inbox.

WAF Vulnerability

WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies

A recently discovered security vulnerability dubbed "BreakingWAF" in the configuration of web application firewall (WAF) services has left numerous Fortune 1000 companies vulnerable to...
Pegasus Spyware

Isreali NSO Group’s Pegasus Spyware Detected in New Mobile Devices

Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed "Rainbow Ronin"), showing that spyware targets...
AWS Security Incident Response

AWS Launched New Security Incident Response Service to Boost Enterprise Security

Amazon Web Services (AWS) unveiled a new service, AWS Security Incident Response, designed to help organizations manage security events efficiently. As cyber threats become...
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks

North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks

Researchers from South Korea have discovered that the notorious North Korean hacking group, known as Kimsuky, has adapted its phishing tactics to use malwareless...
Rockstar 2FA

“Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks

Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks. Highly...
InputSnatch Side-Channel Attack

InputSnatch – A Side-Channel Attack Allow Attackers Steal The Input Data From LLM Models

In a recent study, cybersecurity researchers have unveiled a new side-channel attack that threatens the privacy of users interacting with large language models (LLMs)....
GPU DDK Vulnerabilities

Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory

A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit...
Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations

In today’s rapidly evolving threat landscape, security leaders must make informed decisions to protect their organizations effectively. The "MITRE Engenuity ATT&CK Evaluations: Enterprise" serve...
New Stealthy GodLoader Malware Attacking Windows, macOS, Linux, Android, & iOS Devices

New Stealthy GodLoader Malware Attacking Windows, macOS, Linux, Android, & iOS Devices

A newly discovered malware, dubbed GodLoader, is raising alarms in the cybersecurity community for its ability to stealthily infect devices across multiple operating systems,...
Teaching AI to Hack

Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows

In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...