Cybersecurity experts are warning website owners after hackers began actively exploiting two critical vulnerabilities in Craft CMS, a content management system, leaving hundreds of servers compromised. The flaws — CVE-2024-58136 and CVE-2025-32432 — were discovered by Orange Cyberdefense’s SensePost team during a forensic investigation in mid-February. Their research revealed that attackers are using these bugs…
85% of CEOs say cybersecurity fuels business growth. Learn how AI, global threats, and evolving priorities are reshaping the security landscape.
Chinese-linked group Lotus Panda targeted Southeast Asian governments with sideloaded malware and Chrome credential stealers, says Symantec.
A notorious Russian hosting service provider known as Proton66 is at the center of a series of widespread cyberattacks and malware campaigns targeting organizations and users worldwide, according to fresh findings from cybersecurity experts. Researchers at Trustwave SpiderLabs have linked the provider to a surge in dangerous activities — from credential brute-forcing and mass vulnerability…
A Russian state-linked hacking group is ramping up its cyberattacks against diplomatic targets across Europe, using a new stealthy malware tool known as “GrapeLoader” to deliver malicious payloads through cleverly disguised phishing emails. According to Check Point Research, the campaign began in January 2025 and is being carried out by APT29 — also known as…
The U.S. extends CVE program funding hours before expiration, averting a crisis and prompting moves toward a more sustainable, community-led future.
Massive layoffs loom at CISA, with 40% of staff at risk. Critics warn the cuts could cripple U.S. cyber defenses and threaten national security.
Discover how evolving USPS mail scams highlight growing cybersecurity risks. Learn how phishing, smishing, and brushing attacks threaten your personal data.
ToddyCat hackers exploit ESET flaw (CVE-2024-11859) to deploy stealthy TCESB malware using DLL hijacking and a vulnerable Dell driver.
Xanthorox AI, a darknet-exclusive tool, uses five custom models to launch advanced, autonomous cyberattacks, ushering in a new AI threat era.