Cybersecurity Threats

Critical VMware ESXi Flaw Lets Hackers Escape Virtual Machines and Deploy Ransomware

Critical VMware ESXi Flaw Lets Hackers Escape Virtual M...

Ransomware groups are actively exploiting a critical VMware ESXi sandbox escape ...

Fake File Conversion Tools Distribute Malicious File Converter Apps and Backdoor Malware

Fake File Conversion Tools Distribute Malicious File Co...

Fake file converter apps promoted through malicious Google ads are infecting use...

Malicious Chrome Extensions Bypass Google Review Process, Enabling Phishing and Browser Hijacking Attacks

Malicious Chrome Extensions Bypass Google Review Proces...

A new malware-as-a-service called Stanley is spreading malicious Chrome extensio...

Redmi Buds Found Vulnerable to Bluetooth Attacks, Exposing Users to Data Leaks and Device Disruptions

Redmi Buds Found Vulnerable to Bluetooth Attacks, Expos...

Security researchers have discovered critical Bluetooth vulnerabilities in Xiaom...

Google Calendar Vulnerability Lets Hackers Exploit Gemini AI to Leak Private Meeting Data

Google Calendar Vulnerability Lets Hackers Exploit Gemi...

A Google Gemini vulnerability allowed hackers to exploit Google Calendar using A...

Google Issues Urgent Chrome Security Update to Fix High-Severity WebView Vulnerability

Google Issues Urgent Chrome Security Update to Fix High...

Google has released an urgent Chrome security update to fix the high-severity CV...

CISA KEV List Update Shows Sharp Increase in Actively Exploited Vulnerabilities

CISA KEV List Update Shows Sharp Increase in Actively E...

The Known Exploited Vulnerabilities (KEV) list is maintained by CISA to track so...

Hypervisor Security Emerges as a Top Concern as Ransomware Attacks Hit Virtual Infrastructure

Hypervisor Security Emerges as a Top Concern as Ransomw...

Ransomware attacks are increasingly targeting hypervisors in 2025, putting entir...

New Android Malware DroidLock Locks Phones and Steals Data Through Fake APK Apps, Raising Serious Mobile Security Concerns

New Android Malware DroidLock Locks Phones and Steals D...

New Android ransomware DroidLock spreads through malicious APK files, locking de...

Critical Zero-Click AI Vulnerability Allows Hidden Data Access via Google Docs and Enterprise Workflows

Critical Zero-Click AI Vulnerability Allows Hidden Data...

A critical AI security flaw called GeminiJack exposes enterprise data through Go...

CISA Issues Alert on Advanced Spyware Attacks Using Fake Messaging App Updates and Zero-Click Malware

CISA Issues Alert on Advanced Spyware Attacks Using Fak...

CISA warns of rising spyware attacks on messaging apps as hackers use QR code sc...

Global Study Finds Ransomware Attacks Target Weekends, Holidays and Mergers Amid Declining Cybersecurity Coverage

Global Study Finds Ransomware Attacks Target Weekends, ...

Ransomware attacks are rising during weekends, holidays and mergers as understaf...

CISA Warns of Critical Control Web Panel Flaw Threatening Thousands of Linux Servers Worldwide

CISA Warns of Critical Control Web Panel Flaw Threateni...

CISA warns of a critical Control Web Panel (CWP) vulnerability, CVE-2025-48703, ...

New Android Trojan 'Herodotus' Uses Human-Like Behavior to Trick Security Systems and Perform Financial Fraud

New Android Trojan 'Herodotus' Uses Human-Like Behavior...

Cybersecurity firm has uncovered Herodotus, an advanced Android Trojan that mimi...

Chrome Zero-Day CVE-2025-2783 Exploited in Targeted Cyber Espionage Attack, Kaspersky Warns of Major Security Risk

Chrome Zero-Day CVE-2025-2783 Exploited in Targeted Cyb...

A critical Google Chrome zero-day vulnerability (CVE-2025-2783) exploited in Ope...

Emerging Cyber Threat Turns Common PDF Documents into Dangerous Tools for Phishing and Malware Attacks

Emerging Cyber Threat Turns Common PDF Documents into D...

A new cyber threat, MatrixPDF, turns normal PDF files into phishing tools that b...