Last updated: 2025-12-11 01:50 Refresh now
Sanctioned but Still Spying: Intellexa’s Prolific Zero-Day Exploits Continue
Wed, 03 Dec 2025 14:00:00 +0000
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks
Thu, 20 Nov 2025 14:00:00 +0000
Mon, 17 Nov 2025 14:00:00 +0000
Thu, 13 Nov 2025 14:00:00 +0000
No Place Like Localhost: Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480
Mon, 10 Nov 2025 14:00:00 +0000
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
Wed, 05 Nov 2025 14:00:00 +0000
Preparing for Threats to Come: Cybersecurity Forecast 2026
Tue, 04 Nov 2025 14:00:00 +0000
Keys to the Kingdom: A Defender's Guide to Privileged Account Monitoring
Tue, 28 Oct 2025 14:00:00 +0000
Thu, 23 Oct 2025 14:00:00 +0000
Pro-Russia Information Operations Leverage Russian Drone Incursions into Polish Airspace
Tue, 21 Oct 2025 14:00:00 +0000
To Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVER
Mon, 20 Oct 2025 14:00:00 +0000
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains
Thu, 16 Oct 2025 14:00:00 +0000
New Group on the Block: UNC5142 Leverages EtherHiding to Distribute Malware
Thu, 16 Oct 2025 14:00:00 +0000
Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign
Thu, 09 Oct 2025 14:00:00 +0000
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
Tue, 30 Sep 2025 14:00:00 +0000
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
Wed, 24 Sep 2025 14:00:00 +0000
ViewState Deserialization Zero-Day Vulnerability in Sitecore Products (CVE-2025-53690)
Wed, 03 Sep 2025 14:00:00 +0000
Widespread Data Theft Targets Salesforce Instances via Salesloft Drift
Tue, 26 Aug 2025 14:00:00 +0000
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats
Mon, 25 Aug 2025 14:00:00 +0000
A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor
Wed, 20 Aug 2025 14:00:00 +0000
[김정덕의 AI 시대 보안 패러다임-1] AI 시대의 그림자, ‘딥페이크 사기’를 경계하라
Thu, 11 Dec 2025 15:28:00 +0900
한국정보산업연합회 “‘디지털 재난’ 법적 정의·데이터 이중화 의무화 필요”
Thu, 11 Dec 2025 15:00:00 +0900
[AI와 보안] 오픈AI “차세대 AI, 사이버보안에 위협”…스스로 위험 경고한 이유는
Thu, 11 Dec 2025 14:51:00 +0900
국정원, 내년 공공기관 보안 평가에 ‘AI·N2SF’ 대거 반영
Thu, 11 Dec 2025 14:00:00 +0900
네이버, 디지털 보증서 ‘네이버 컬렉션’ 정식 출시…위변조 방지로 안심 구매
Thu, 11 Dec 2025 13:49:00 +0900
안랩클라우드메이트, ‘민간클라우드 기반 AI·데이터레이크 활용지원 사업’ 완료
Thu, 11 Dec 2025 13:46:00 +0900
중국 APT 그룹 실버폭스, SEO 포이즈닝 이용 가짜 팀즈 설치 프로그램 유포
Thu, 11 Dec 2025 11:34:00 +0900
Thu, 11 Dec 2025 10:54:00 +0900
이반티 제품에서 CVSS 9.6 치명적 보안 취약점 발견…긴급 업데이트
Thu, 11 Dec 2025 10:51:00 +0900
늘어나는 산업 재해...에스원, ‘AI 기반 안전 솔루션’으로 막는다
Thu, 11 Dec 2025 10:43:00 +0900
Building Effective LLM Agents | AI Cyber Challenge
Fri, 08 Aug 2025 19:28:00 GMT
AI Cyber Challenge and Theori's RoboDuck
Fri, 08 Aug 2025 19:27:40 GMT
Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge
Fri, 08 Aug 2025 19:25:46 GMT
How to Identify Phishing Scams
Mon, 28 Apr 2025 23:00:00 GMT
Importance of Continuous Security: Lessons from the Bybit Case
Thu, 27 Mar 2025 06:38:06 GMT
Reviving the modprobe_path Technique: Overcoming search_binary_handler() Patch
Sat, 15 Mar 2025 08:52:16 GMT
Four Ways to Protect Your Legacy with Theori’s Cybersecurity Solutions
Sun, 16 Feb 2025 15:00:00 GMT
DeepSeek Security, Privacy, and Governance: Hidden Risks in Open-Source AI
Thu, 06 Feb 2025 15:00:00 GMT
The True Cost of Siloed Security Tools
Fri, 20 Dec 2024 09:00:00 GMT
Finding Vulnerabilities in Firmware with Static Analysis Platform QueryX
Wed, 06 Nov 2024 15:00:00 GMT
Side Effects: When Continuous Development Introduces Security Threats
Mon, 04 Nov 2024 09:00:00 GMT
Top 5 Features Your ASM Solution Must Have
Thu, 24 Oct 2024 09:00:00 GMT
Offensive Security with Large Language Models (2)
Mon, 30 Sep 2024 09:00:00 GMT
Offensive Security with Large Language Models (1)
Fri, 27 Sep 2024 09:00:00 GMT
Winning the AIxCC Qualification Round
Mon, 23 Sep 2024 15:00:00 GMT
Top Penetration Testing Solutions for IT Security: 2024 Guide
Wed, 11 Sep 2024 09:00:00 GMT
Deep Dive into RCU Race Condition: Analysis of TCP-AO UAF (CVE-2024–27394)
Tue, 03 Sep 2024 15:00:00 GMT
Offensive Security vs. Defensive Security: Navigating the Two Pillars of Cybersecurity
Fri, 30 Aug 2024 09:00:00 GMT
A Deep Dive into the CoSoSys EndPoint Protector Exploit: Remote Code Execution
Thu, 29 Aug 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 6 — Windows Kernel LPE: Get SYSTEM
Tue, 21 May 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 5 — VMware Workstation Guest-to-Host Escape
Thu, 02 May 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 4 — VMware Workstation Information leakage
Wed, 17 Apr 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 3 — Windows Driver LPE: Medium to System
Mon, 08 Apr 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 2 — Windows Kernel LPE (a.k.a Chrome Sandbox Escape)
Sun, 31 Mar 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 1 — Chrome Renderer RCE
Sun, 17 Mar 2024 15:00:00 GMT
Fermium-252 : The Cyber Threat Intelligence Database
Sun, 03 Mar 2024 15:00:00 GMT
A Deep Dive into V8 Sandbox Escape Technique Used in In-The-Wild Exploit
Thu, 25 Jan 2024 15:00:00 GMT
Exploiting Windows Kernel Wild Copy With User Fault Handling (CVE-2023–28218)
Thu, 09 Nov 2023 15:00:00 GMT
Thu, 20 Apr 2023 15:00:00 GMT
Linux Kernel Exploit (CVE-2022–32250) with mqueue
Tue, 23 Aug 2022 15:00:00 GMT
Binary-searching into CVMServer
Thu, 16 Jun 2022 15:00:00 GMT
Exploiting Safari’s ANGLE Component
Tue, 17 May 2022 15:00:00 GMT
Patch Gapping a Safari Type Confusion
Mon, 24 May 2021 15:00:00 GMT
Compromising virtualization without attacking the hypervisor
Tue, 20 Oct 2020 15:00:00 GMT
Cleanly Escaping the Chrome Sandbox
Sun, 19 Apr 2020 15:00:00 GMT
Thu, 08 Jun 2017 15:00:00 GMT
Tue, 13 Dec 2016 15:00:00 GMT
Patch Analysis of MS16–063 (jscript9.dll)
Sun, 26 Jun 2016 15:00:00 GMT
Patch Analysis of CVE-2016–0189
Tue, 21 Jun 2016 15:00:00 GMT
Storm-0249 Abuses EDR Processes in Stealthy Attacks
Wed, 10 Dec 2025 21:59:32 GMT
ClickFix Style Attack Uses Grok, ChatGPT for Malware Delivery
Wed, 10 Dec 2025 21:02:30 GMT
Feds: Pro-Russia Hactivists Target US Critical Infrastructure
Wed, 10 Dec 2025 12:56:02 GMT
Japanese Firms Suffer Long Tail of Ransomware Damage
Wed, 10 Dec 2025 00:00:00 GMT
Microsoft Fixes Exploited Zero Day in Light Patch Tuesday
Tue, 09 Dec 2025 22:24:18 GMT
Packer-as-a-Service Shanya Hides Ransomware, Kills EDR
Tue, 09 Dec 2025 20:10:32 GMT
Analysts Warn of Cybersecurity Risks in Humanoid Robots
Tue, 09 Dec 2025 16:41:27 GMT
Gemini Enterprise No-Click Flaw Exposes Sensitive Data
Tue, 09 Dec 2025 12:08:41 GMT
Apache Issues Max-Severity Tika CVE After Patch Miss
Mon, 08 Dec 2025 22:01:47 GMT
Exploitation Activity Ramps Up Against React2Shell
Mon, 08 Dec 2025 21:41:25 GMT
US Treasury Tracks $4.5B in Ransom Payments since 2013
Mon, 08 Dec 2025 20:21:00 GMT
'Broadside' Mirai Variant Targets Maritime Logistics Sector
Mon, 08 Dec 2025 11:17:12 GMT
Rust Code Delivers Better Security, Also Streamlines DevOps
Fri, 05 Dec 2025 22:01:05 GMT
India Rolls Back App Mandate Amid Surveillance Concerns
Fri, 05 Dec 2025 20:06:26 GMT
Threat Landscape Grows Increasingly Dangerous for Manufacturers
Fri, 05 Dec 2025 15:34:58 GMT
React2Shell Vulnerability Under Attack From China-Nexus Groups
Fri, 05 Dec 2025 15:14:26 GMT
CISOs Should Be Asking These Quantum Questions Today
Fri, 05 Dec 2025 15:00:00 GMT
How Agentic AI Can Boost Cyber Defense
Thu, 04 Dec 2025 23:05:15 GMT
A Tale of Two CISOs: Why An Engineering-Focused CISO Can Be a Liability
Thu, 04 Dec 2025 22:13:41 GMT
CISA Warns of 'Ongoing' Brickstorm Backdoor Attacks
Thu, 04 Dec 2025 21:58:14 GMT
CISA Publishes Security Guidance for Using AI in OT
Thu, 04 Dec 2025 20:46:27 GMT
ServiceNow's Acquisition of NHI Provider Veza Strengthens Governance Portfolio
Thu, 04 Dec 2025 15:29:11 GMT
Student Sells Gov't, University Sites to Chinese Actors
Thu, 04 Dec 2025 14:00:00 GMT
'MuddyWater' Hackers Target Israeli Orgs With Retro Game Tactic
Thu, 04 Dec 2025 07:00:00 GMT
'ShadyPanda' Hackers Weaponize Millions of Browsers
Wed, 03 Dec 2025 22:06:56 GMT
Critical React Flaw Triggers Calls for Immediate Action
Wed, 03 Dec 2025 21:51:03 GMT
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
Arizona AG Sues Temu Over 'Stealing' User Data
Wed, 03 Dec 2025 21:00:58 GMT
The Ransomware Holiday Bind: Burnout or Be Vulnerable
Wed, 03 Dec 2025 13:52:29 GMT
AI Bolsters Python Variant of Brazilian WhatsApp Attacks
Wed, 03 Dec 2025 10:56:24 GMT
China Researches Ways to Disrupt Satellite Internet
Wed, 03 Dec 2025 02:00:00 GMT
While ECH Adoption Is Low, Risks Remain for Enterprises, End Users
Tue, 02 Dec 2025 23:32:08 GMT
Iran's 'MuddyWater' Levels Up With MuddyViper Backdoor
Tue, 02 Dec 2025 21:39:21 GMT
Researchers Use Poetry to Jailbreak AI Models
Tue, 02 Dec 2025 20:24:36 GMT
New Raptor Framework Uses Agentic Workflows to Create Patches
Tue, 02 Dec 2025 15:16:26 GMT
DPRK's 'Contagious Interview' Spawns Malicious Npm Package Factory
Tue, 02 Dec 2025 13:02:14 GMT
Tomiris Unleashes 'Havoc' With New Tools, Tactics
Mon, 01 Dec 2025 22:06:19 GMT
CodeRED Emergency Alert Platform Shut Down Following Cyberattack
Mon, 01 Dec 2025 21:24:39 GMT
Police Disrupt 'Cryptomixer,' Seize Millions in Crypto
Mon, 01 Dec 2025 20:07:00 GMT
Shai-hulud 2.0 Variant Threatens Cloud Ecosystem
Mon, 01 Dec 2025 11:10:12 GMT
Digital Fraud at Industrial Scale: 2025 Wasn't Great
Wed, 26 Nov 2025 17:06:03 GMT
'Dark LLMs' Aid Petty Criminals, But Underwhelm Technically
Wed, 26 Nov 2025 16:01:35 GMT
Prompt Injections Loom Large Over ChatGPT's Atlas Browser
Wed, 26 Nov 2025 15:52:49 GMT
How Malware Authors Are Incorporating LLMs to Evade Detection
Wed, 26 Nov 2025 15:12:05 GMT
Enterprises Aren't Confident They Can Secure Non-Human Identities (NHIs)
Wed, 26 Nov 2025 15:00:00 GMT
Iran Exploits Cyber Domain to Aid Kinetic Strikes
Wed, 26 Nov 2025 05:30:00 GMT
Advanced Security Isn't Stopping Ancient Phishing Tactics
Tue, 25 Nov 2025 22:23:05 GMT
Cheap Hardware Module Bypasses AMD, Intel Memory Encryption
Tue, 25 Nov 2025 22:11:24 GMT
DPRK's FlexibleFerret Tightens macOS Grip
Tue, 25 Nov 2025 21:39:03 GMT
With Friends Like These: China Spies on Russian IT Orgs
Tue, 25 Nov 2025 15:59:04 GMT
Windows Defender Firewall Service Vulnerability Let Attackers Disclose Sensitive Data
Thu, 11 Dec 2025 04:15:59 +0000
Adobe Acrobat Reader Vulnerabilities Let Attackers Execute Arbitrary Code and Bypass Security
Thu, 11 Dec 2025 03:37:52 +0000
Google Warns of Chrome 0-Day Vulnerability Actively Exploited in the wild
Thu, 11 Dec 2025 03:34:25 +0000
Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS
Wed, 10 Dec 2025 17:36:41 +0000
Over 644,000 Domains Exposed to Critical React Server Components Vulnerability
Wed, 10 Dec 2025 16:49:02 +0000
New Spiderman Phishing Kit Lets Attackers Create Malicious Bank Login Pages in Few Clicks
Wed, 10 Dec 2025 16:10:16 +0000
What’s Next for SOC in 2026: Get the Early-Adopter Advantage
Wed, 10 Dec 2025 14:33:41 +0000
Threat Actors Weaponize ChatGPT and Grok Conversations to Deploy AMOS Stealer
Wed, 10 Dec 2025 12:13:06 +0000
Microsoft Outlook Vulnerability Let Attackers Execute Malicious Code Remotely
Wed, 10 Dec 2025 11:22:23 +0000
North Korean Hackers Exploit React2Shell Vulnerability in the Wild to Deploy EtherRAT
Wed, 10 Dec 2025 11:00:28 +0000