August 6, 2025 No Comments Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams
August 6, 2025 No Comments Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems
August 6, 2025 No Comments Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools
August 6, 2025 No Comments AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals
August 6, 2025 No Comments CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures
August 6, 2025 No Comments CISA Adds 3 D-Link Router Flaws to KEV Catalog After Active Exploitation Reports
August 6, 2025 No Comments AI Is Transforming Cybersecurity Adversarial Testing – Pentera Founder’s Vision
August 5, 2025 No Comments ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections
August 5, 2025 No Comments Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval
August 5, 2025 No Comments Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild