Most Recent Articles
Threat Actors Exploit High-Severity Bypass Vulnerability in WordPress Plugin
Security researchers spotted threat actors exploiting a severe WordPress plugin vulnerability almost immediately after the flaw’s disclosure.
Authentication bypass vulnerability in WordPress plugin
An authentication bypass vulnerability affecting th…
Some Free File Converters Aren’t as Safe as They Seem — Here’s Why
Turning a PDF into a Word document, converting a PowerPoint into a PDF, or opening a lesser-known format with free tools found on the internet is something we’ve all done at some point—especially when we’re in a hurry.
Free document conversion web…
SEO Poisoning: How Hackers Use Search Engines to Target Businesses Like Yours
Search engines help us find information quickly, but they can also be misused by cybercriminals. SEO poisoning is a tactic where attackers manipulate search engine rankings to push harmful websites to the top of search results.
This method isn’t just …
Attackers Bypass Newly Upgraded Defenses of Germany’s Largest Eastern European Studies Association
The Deutsche Gesellschaft für Osteuropakunde (DGO) confirmed Thursday that it has been the target of a new cyberattack, months after a similar breach in 2024. German authorities suspect Russian state-sponsored actors are the culprit.
The organization …
Law Enforcement Operation Seizes ‘Smokeloader’ Botnet Servers
A coordinated law enforcement operation has led to the seizure of several ‘Smokeloader’ botnet servers and the arrest of some of its customers.
More than 100 servers seized in operation ‘Endgame’
Authorities unfolded a massive operation against thre…
WhatsApp for Windows Bug Lets Attackers Obfuscate Malware in Attachments
A vulnerability in the Windows WhatsApp client lets threat actors inject dangerous malware into apparently legitimate attachments.
Meta discloses bug in WhatsApp Windows client
Meta is warning WhatsApp users that a spoofing vulnerability could let t…
How the EU Plans to Strengthen Cybersecurity in Healthcare
Citing an alarming rise in cyber-attacks against healthcare providers and suppliers, the EC, a European Union (EU) entity that proposes laws and manages EU policies, recently unveiled a first-of-its-kind “action plan” to help hospitals, clinics, and ot…
New Wi-Fi Restriction policies for improved network security with IBM® MaaS360® Android app version 8.90
From Android version 8.90 and later, IBM® MaaS360® introduces new Wi-Fi restriction policies to provide IT administrators with enhanced control over Wi-Fi settings on Android 13+ devices. These new policies use Google’s latest Android 13 APIs by offeri…