CyberSecurity Research

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers – Detailed Case Study

The cybersecurity landscape has been significantly impacted by the discovery and active exploitation of two critical zero-day vulnerabilities in WinRAR,…

4 weeks ago

5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them

As students return to campus and online learning platforms, cybercriminals are increasingly leveraging artificial intelligence to create sophisticated scams targeting…

4 weeks ago

DragonForce Ransomware Attack Analysis – Targets, TTPs and IoCs

DragonForce represents a sophisticated and rapidly evolving ransomware operation that has emerged as a significant threat in the cybersecurity landscape…

1 month ago

New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users

A sophisticated new cyberthreat campaign has emerged that combines impersonation of trusted news sources with deceptive security verification prompts to…

1 month ago

APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures

APT SideWinder, also known as Rattlesnake, Razor Tiger, and T-APT-04, is a nation-state advanced persistent threat (APT) group active since…

1 month ago

New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash “/”

Security researchers have uncovered a sophisticated new phishing campaign that exploits the Japanese hiragana character "ん" to create deceptively authentic-looking…

1 month ago

How ShinyHunters Breached Google, Adidas, Louis Vuitton and More in Ongoing Salesforce Attack Campaign

The cybersecurity landscape witnessed a sophisticated and ongoing attack campaign throughout 2025 that has successfully compromised major corporations, including Google,…

1 month ago

10 Best ZTNA Solutions (Zero Trust Network Access) In 2025

Zero Trust Network Access (ZTNA) has become a cornerstone of modern cybersecurity strategies, especially as organizations embrace remote work, cloud…

3 months ago

Xiaomi Smartwatch Hacked Using Touch Point to Find Unlock PIN coordinates

Security researcher Sergei Volokitin has presented findings on hardware vulnerabilities discovered in Xiaomi devices, including the company's S3 smartwatch, during…

3 months ago

Ghidra 11.3 Released – NSA’s Powerful Reverse Engineering Tool

The National Security Agency (NSA) has launched Ghidra 11.3, the latest version of its open-source software reverse engineering (SRE) framework.…

8 months ago