Kali Linux has released version 2025.3, the third version of 2025, featuring ten new tools, Nexmon support, and NetHunter improvements. […] Go to Source Author: Lawrence Abrams
Category Archives: Security
Cisco has released security updates to address a high-severity zero-day vulnerability in Cisco IOS and IOS XE Software that is currently being exploited in attacks. […] Go to Source Author: Sergiu Gatlan
A vulnerability in multiple OnePlus OxygenOS versions allows any installed app to access SMS data and metadata without requiring permission or user interaction. […] Go to Source Author: Bill Toulas
In a five-month joint operation led by Interpol, law enforcement agencies have seized more than $439 million in cash and cryptocurrency linked to cyber-enabled financial crimes that impacted thousands of victims worldwide. […] Go to Source Author: Sergiu Gatlan
Huntress analysts discovered a previously unseen ransomware variant, Obscura, spreading from a victim company’s domain controller. Learn how Obscura works—and what it means for defenders—in this week’s Tradecraft Tuesday. […] Go to Source Author: Sponsored by Huntress Labs
Suspected Chinese hackers have used the Brickstorm malware in long-term persistence espionage operations against U.S. organizations in the technology and legal sectors. […] Go to Source Author: Bill Toulas
The UK’s National Crime Agency has arrested a suspect linked to a ransomware attack that is causing widespread disruptions across European airports. […] Go to Source Author: Sergiu Gatlan
The Python Software Foundation has warned victims of a new wave of phishing attacks using a fake Python Package Index (PyPI) website to reset credentials. […] Go to Source Author: Sergiu Gatlan
A massive phishing campaign targeted GitHub users with cryptocurrency drainers, delivered via fake invitations to the Y Combinator (YC) W2026 program. […] Go to Source Author: Bill Toulas
US gaming and casino operator Boyd Gaming Corporation disclosed it suffered a breach after threat actors gained access to its systems and stole data, including employee information and data belonging to a limited number of other individuals. […] Go to Source Author: Lawrence Abrams
