Category: Cyber Security


  • Cisco SD-WAN flaws actively exploited in ongoing attacks

    Newly disclosed Cisco SD-WAN flaws are being actively exploited in cyberattacks targeting enterprise network infrastructure. Cisco confirmed that attackers are abusing vulnerabilities affecting its Catalyst SD-WAN Manager platform. The management system controls networking policies and traffic across distributed enterprise environments. A compromise of this system could expose entire corporate networks to attackers. Security teams are…

  • Phobos ransomware admin pleads guilty to cybercrime conspiracy

    A Phobos ransomware admin has pleaded guilty to participating in a major cybercrime operation. United States prosecutors say the administrator helped run a ransomware service used in attacks against organizations worldwide. The case marks an important development in the international fight against ransomware groups. Investigators say the operation enabled hundreds of cybercriminal affiliates to launch…

  • Mail2Shell attack enables zero-click takeover of FreeScout servers

    A newly disclosed Mail2Shell attack exposes FreeScout mail servers to remote takeover through a malicious email. Researchers warn that attackers can exploit the flaw without authentication or user interaction. The vulnerability allows remote code execution on vulnerable systems. Because the attack requires only a crafted email message, it creates a serious risk for organizations running…

  • Grammarly expert review sparks backlash over dead scholars

    The new Grammarly expert review feature has sparked criticism among academics. Researchers say the tool references scholars without their permission and sometimes includes individuals who have already died. The controversy began after users noticed that the system suggested feedback inspired by well-known academics. Critics argue that this approach raises ethical concerns about how artificial intelligence…

  • LeakBase shutdown dismantles cybercrime data-sharing forum

    The LeakBase shutdown marks a major international operation targeting cybercrime infrastructure. Authorities from several countries worked together to dismantle the online forum used to share stolen data and hacking tools. Investigators say the platform served as a hub where cybercriminals distributed breached databases and compromised credentials. The takedown highlights growing global cooperation against online crime…

  • Telegram hacker marketplace sells stolen logins and malware

    Cybercriminals increasingly rely on a Telegram hacker marketplace to sell stolen data and hacking tools. Researchers warn that the messaging platform now hosts growing communities focused on cybercrime. Instead of using traditional dark web forums, many threat actors advertise services directly through Telegram channels. These groups sell stolen credentials, compromised system access, and malware tools…

  • iPhone Exploit Kit Used by Hackers After Government Tool Leak

    A powerful iPhone exploit kit once associated with government surveillance operations is now being used by hackers in broader cyber campaigns. Security researchers say the toolkit contains multiple vulnerabilities that can be chained together to compromise Apple devices. The exploit framework, known as Coruna, includes a collection of advanced techniques designed to bypass several layers…

  • TikTok End-to-End Encryption Debate Grows Over Message Privacy

    Debate around TikTok end-to-end encryption is growing after the platform confirmed that it does not plan to introduce encryption for direct messages. The decision separates TikTok from many other large messaging platforms that already protect private conversations with strong encryption. End-to-end encryption ensures that only the sender and the recipient can read the contents of…

  • Meta Scam Ads Continue Circulating on Facebook and Instagram

    Concerns are growing over the spread of Meta scam ads across Facebook and Instagram. Consumer watchdogs warn that fraudulent advertisers continue to promote deceptive online stores through paid promotions on the platforms. The issue resurfaced after a recent investigation examined scam advertisements linked to known fraudulent websites. Despite moderation policies designed to block misleading ads,…

  • Ivanti RESURGE Malware Found Dormant on Connect Secure Devices

    Security researchers have identified Ivanti RESURGE malware lingering on compromised Connect Secure VPN appliances. The threat appears capable of remaining dormant inside affected systems, allowing attackers to reactivate access long after the original intrusion. The discovery raises concerns for organizations that rely on Ivanti Connect Secure devices to manage remote access to internal networks. Even…