Newly disclosed Cisco SD-WAN flaws are being actively exploited in cyberattacks targeting enterprise network infrastructure. Cisco confirmed that attackers are abusing vulnerabilities affecting its Catalyst SD-WAN Manager platform. The management system controls networking policies and traffic across distributed enterprise environments. A compromise of this system could expose entire corporate networks to attackers. Security teams are…
A Phobos ransomware admin has pleaded guilty to participating in a major cybercrime operation. United States prosecutors say the administrator helped run a ransomware service used in attacks against organizations worldwide. The case marks an important development in the international fight against ransomware groups. Investigators say the operation enabled hundreds of cybercriminal affiliates to launch…
A newly disclosed Mail2Shell attack exposes FreeScout mail servers to remote takeover through a malicious email. Researchers warn that attackers can exploit the flaw without authentication or user interaction. The vulnerability allows remote code execution on vulnerable systems. Because the attack requires only a crafted email message, it creates a serious risk for organizations running…
The new Grammarly expert review feature has sparked criticism among academics. Researchers say the tool references scholars without their permission and sometimes includes individuals who have already died. The controversy began after users noticed that the system suggested feedback inspired by well-known academics. Critics argue that this approach raises ethical concerns about how artificial intelligence…
The LeakBase shutdown marks a major international operation targeting cybercrime infrastructure. Authorities from several countries worked together to dismantle the online forum used to share stolen data and hacking tools. Investigators say the platform served as a hub where cybercriminals distributed breached databases and compromised credentials. The takedown highlights growing global cooperation against online crime…
Cybercriminals increasingly rely on a Telegram hacker marketplace to sell stolen data and hacking tools. Researchers warn that the messaging platform now hosts growing communities focused on cybercrime. Instead of using traditional dark web forums, many threat actors advertise services directly through Telegram channels. These groups sell stolen credentials, compromised system access, and malware tools…
A powerful iPhone exploit kit once associated with government surveillance operations is now being used by hackers in broader cyber campaigns. Security researchers say the toolkit contains multiple vulnerabilities that can be chained together to compromise Apple devices. The exploit framework, known as Coruna, includes a collection of advanced techniques designed to bypass several layers…
Debate around TikTok end-to-end encryption is growing after the platform confirmed that it does not plan to introduce encryption for direct messages. The decision separates TikTok from many other large messaging platforms that already protect private conversations with strong encryption. End-to-end encryption ensures that only the sender and the recipient can read the contents of…
Security researchers have identified Ivanti RESURGE malware lingering on compromised Connect Secure VPN appliances. The threat appears capable of remaining dormant inside affected systems, allowing attackers to reactivate access long after the original intrusion. The discovery raises concerns for organizations that rely on Ivanti Connect Secure devices to manage remote access to internal networks. Even…