Last updated: 2025-12-29 16:38 Refresh now
Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)
Fri, 12 Dec 2025 14:00:00 +0000
Sanctioned but Still Spying: Intellexa’s Prolific Zero-Day Exploits Continue
Wed, 03 Dec 2025 14:00:00 +0000
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks
Thu, 20 Nov 2025 14:00:00 +0000
Mon, 17 Nov 2025 14:00:00 +0000
Thu, 13 Nov 2025 14:00:00 +0000
No Place Like Localhost: Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480
Mon, 10 Nov 2025 14:00:00 +0000
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
Wed, 05 Nov 2025 14:00:00 +0000
Preparing for Threats to Come: Cybersecurity Forecast 2026
Tue, 04 Nov 2025 14:00:00 +0000
Keys to the Kingdom: A Defender's Guide to Privileged Account Monitoring
Tue, 28 Oct 2025 14:00:00 +0000
Thu, 23 Oct 2025 14:00:00 +0000
Pro-Russia Information Operations Leverage Russian Drone Incursions into Polish Airspace
Tue, 21 Oct 2025 14:00:00 +0000
To Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVER
Mon, 20 Oct 2025 14:00:00 +0000
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains
Thu, 16 Oct 2025 14:00:00 +0000
New Group on the Block: UNC5142 Leverages EtherHiding to Distribute Malware
Thu, 16 Oct 2025 14:00:00 +0000
Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign
Thu, 09 Oct 2025 14:00:00 +0000
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
Tue, 30 Sep 2025 14:00:00 +0000
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
Wed, 24 Sep 2025 14:00:00 +0000
ViewState Deserialization Zero-Day Vulnerability in Sitecore Products (CVE-2025-53690)
Wed, 03 Sep 2025 14:00:00 +0000
Widespread Data Theft Targets Salesforce Instances via Salesloft Drift
Tue, 26 Aug 2025 14:00:00 +0000
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats
Mon, 25 Aug 2025 14:00:00 +0000
[2025 보안 사고·이슈 결산-13] 쿠팡 민낯 드러낸 3370만명 개인정보 유출
Mon, 29 Dec 2025 17:57:00 +0900
“개인정보 대규모 유출하면 ISMS·ISMS-P 인증 취소” 정부, 정보보호 기준 대폭 강화
Mon, 29 Dec 2025 17:35:00 +0900
“이용자 통화 탈취 위험 노출”... KT, 전체 이용자 위약금 면제 적용 가능
Mon, 29 Dec 2025 17:22:00 +0900
[쿠팡 해킹] “영업정지 여부 등 판단 계획”... 정부 범부처 전방위 압박
Mon, 29 Dec 2025 15:54:00 +0900
[글로벌 인터뷰] 이이지마 카츠노리 요꼬가와전기 사이버보안 사업부장
Mon, 29 Dec 2025 15:44:00 +0900
[국방보안 칼럼] 2026년 보안위협 전망: 드론 대량생산이 만든 새로운 공격 표면
Mon, 29 Dec 2025 15:40:00 +0900
[IP포토] 지재처, 특허법조약(PLT) TF 착수회의 개최
Mon, 29 Dec 2025 15:33:00 +0900
IT 전문매체 와이어드 구독자 230만명 개인정보 다크웹 유출
Mon, 29 Dec 2025 15:20:00 +0900
과기정통부, 카카오 ‘카나나’ 대상 국내 첫 인공지능 안전성 평가
Mon, 29 Dec 2025 14:33:00 +0900
SGA솔루션즈, 크레온유니티 인수로 ‘보안·운영 융합’ 새 성장 축 마련
Mon, 29 Dec 2025 14:25:00 +0900
Tue, 16 Dec 2025 00:43:33 GMT
Building Effective LLM Agents | AI Cyber Challenge
Fri, 08 Aug 2025 19:28:00 GMT
AI Cyber Challenge and Theori's RoboDuck
Fri, 08 Aug 2025 19:27:40 GMT
Inside the brain of a hacking robot: Exploring traces | AI Cyber Challenge
Fri, 08 Aug 2025 19:25:46 GMT
How to Identify Phishing Scams
Mon, 28 Apr 2025 23:00:00 GMT
Importance of Continuous Security: Lessons from the Bybit Case
Thu, 27 Mar 2025 06:38:06 GMT
Reviving the modprobe_path Technique: Overcoming search_binary_handler() Patch
Sat, 15 Mar 2025 08:52:16 GMT
Four Ways to Protect Your Legacy with Theori’s Cybersecurity Solutions
Sun, 16 Feb 2025 15:00:00 GMT
DeepSeek Security, Privacy, and Governance: Hidden Risks in Open-Source AI
Thu, 06 Feb 2025 15:00:00 GMT
The True Cost of Siloed Security Tools
Fri, 20 Dec 2024 09:00:00 GMT
Finding Vulnerabilities in Firmware with Static Analysis Platform QueryX
Wed, 06 Nov 2024 15:00:00 GMT
Side Effects: When Continuous Development Introduces Security Threats
Mon, 04 Nov 2024 09:00:00 GMT
Top 5 Features Your ASM Solution Must Have
Thu, 24 Oct 2024 09:00:00 GMT
Offensive Security with Large Language Models (2)
Mon, 30 Sep 2024 09:00:00 GMT
Offensive Security with Large Language Models (1)
Fri, 27 Sep 2024 09:00:00 GMT
Winning the AIxCC Qualification Round
Mon, 23 Sep 2024 15:00:00 GMT
Top Penetration Testing Solutions for IT Security: 2024 Guide
Wed, 11 Sep 2024 09:00:00 GMT
Deep Dive into RCU Race Condition: Analysis of TCP-AO UAF (CVE-2024–27394)
Tue, 03 Sep 2024 15:00:00 GMT
Offensive Security vs. Defensive Security: Navigating the Two Pillars of Cybersecurity
Fri, 30 Aug 2024 09:00:00 GMT
A Deep Dive into the CoSoSys EndPoint Protector Exploit: Remote Code Execution
Thu, 29 Aug 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 6 — Windows Kernel LPE: Get SYSTEM
Tue, 21 May 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 5 — VMware Workstation Guest-to-Host Escape
Thu, 02 May 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 4 — VMware Workstation Information leakage
Wed, 17 Apr 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 3 — Windows Driver LPE: Medium to System
Mon, 08 Apr 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 2 — Windows Kernel LPE (a.k.a Chrome Sandbox Escape)
Sun, 31 Mar 2024 15:00:00 GMT
Chaining N-days to Compromise All: Part 1 — Chrome Renderer RCE
Sun, 17 Mar 2024 15:00:00 GMT
Fermium-252 : The Cyber Threat Intelligence Database
Sun, 03 Mar 2024 15:00:00 GMT
A Deep Dive into V8 Sandbox Escape Technique Used in In-The-Wild Exploit
Thu, 25 Jan 2024 15:00:00 GMT
Exploiting Windows Kernel Wild Copy With User Fault Handling (CVE-2023–28218)
Thu, 09 Nov 2023 15:00:00 GMT
Thu, 20 Apr 2023 15:00:00 GMT
Linux Kernel Exploit (CVE-2022–32250) with mqueue
Tue, 23 Aug 2022 15:00:00 GMT
Binary-searching into CVMServer
Thu, 16 Jun 2022 15:00:00 GMT
Exploiting Safari’s ANGLE Component
Tue, 17 May 2022 15:00:00 GMT
Patch Gapping a Safari Type Confusion
Mon, 24 May 2021 15:00:00 GMT
Compromising virtualization without attacking the hypervisor
Tue, 20 Oct 2020 15:00:00 GMT
Cleanly Escaping the Chrome Sandbox
Sun, 19 Apr 2020 15:00:00 GMT
Thu, 08 Jun 2017 15:00:00 GMT
Tue, 13 Dec 2016 15:00:00 GMT
Patch Analysis of MS16–063 (jscript9.dll)
Sun, 26 Jun 2016 15:00:00 GMT
Patch Analysis of CVE-2016–0189
Tue, 21 Jun 2016 15:00:00 GMT
SBOMs in 2026: Some Love, Some Hate, Much Ambivalence
Mon, 29 Dec 2025 14:51:59 GMT
5 Threats That Defined Security in 2025
Mon, 29 Dec 2025 14:00:00 GMT
Mentorship and Diversity: Shaping the Next Generation of Cyber Experts
Fri, 26 Dec 2025 15:15:00 GMT
As More Coders Adopt AI Agents, Security Pitfalls Lurk in 2026
Fri, 26 Dec 2025 13:04:07 GMT
Dark Reading Opens The State of Application Security Survey
Fri, 26 Dec 2025 12:00:48 GMT
Industry Continues to Push Back on HIPAA Security Rule Overhaul
Tue, 23 Dec 2025 20:22:19 GMT
ServiceNow Buys Armis for $7.75B, Boosts 'AI Control Tower'
Tue, 23 Dec 2025 20:03:15 GMT
Amazon Fends Off 1,800 Suspected DPRK IT Job Scammers
Tue, 23 Dec 2025 17:42:50 GMT
Sprawling 'Operation Sentinel' Neutralizes African Cybercrime Syndicates
Tue, 23 Dec 2025 17:16:35 GMT
Threat Actors Exploit Zero-Day in WatchGuard Firebox Devices
Mon, 22 Dec 2025 20:29:34 GMT
Uzbek Users Under Attack by Android SMS-Stealers
Mon, 22 Dec 2025 17:07:10 GMT
Cisco VPNs, Email Services Hit in Separate Threat Campaigns
Fri, 19 Dec 2025 20:05:38 GMT
LongNosedGoblin Caught Snooping on Asian Governments
Fri, 19 Dec 2025 16:38:48 GMT
Identity Fraud Among Home-Care Workers Puts Patients at Risk
Fri, 19 Dec 2025 15:04:50 GMT
A Cybersecurity Playbook for AI Adoption
Fri, 19 Dec 2025 14:00:00 GMT
A Good Year for North Korean Cybercriminals
Fri, 19 Dec 2025 14:00:00 GMT
SonicWall Edge Access Devices Hit by Zero-Day Attacks
Thu, 18 Dec 2025 22:25:46 GMT
Dark Reading Confidential: Stop Secrets Creep Across Developer Platforms
Thu, 18 Dec 2025 18:55:13 GMT
Dormant Iran APT is Still Alive, Spying on Dissidents
Thu, 18 Dec 2025 13:00:00 GMT
Critical Fortinet Flaws Under Active Attack
Wed, 17 Dec 2025 22:44:38 GMT
In Cybersecurity, Claude Leaves Other LLMs in the Dust
Wed, 17 Dec 2025 22:01:58 GMT
'Cellik' Android RAT Leverages Google Play Store
Wed, 17 Dec 2025 21:38:50 GMT
Securing the Network Edge: A Comprehensive Framework for Modern Cybersecurity
Wed, 17 Dec 2025 21:14:12 GMT
'Fake Proof' and AI Slop Hobble Defenders
Wed, 17 Dec 2025 20:58:31 GMT
The Future of Quantum-Safe Networks Depends on Interoperable Standards
Wed, 17 Dec 2025 20:46:43 GMT
Attackers Use Stolen AWS Credentials in Cryptomining Campaign
Wed, 17 Dec 2025 16:33:22 GMT
Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation
Wed, 17 Dec 2025 07:00:00 GMT
Why a 17-Year-Old Built an AI Model to Expose Deepfake Maps
Tue, 16 Dec 2025 22:53:00 GMT
Why You Should Train Your SOC Like a Triathlete
Tue, 16 Dec 2025 22:20:33 GMT
Venezuelan Oil Company Downplays Alleged US Cyberattack
Tue, 16 Dec 2025 20:33:16 GMT
Russia Hits Critical Orgs Via Misconfigured Edge Devices
Tue, 16 Dec 2025 20:03:15 GMT
Browser Extension Harvests 8M Users' AI Chatbot Data
Tue, 16 Dec 2025 16:14:01 GMT
Enterprises Gear Up Ahead of 2026's IT Transformation Shift
Tue, 16 Dec 2025 15:08:23 GMT
How Cyber Insurance MGAs Shape Policies for Evolving Cyber-Risks
Mon, 15 Dec 2025 22:28:47 GMT
Apple Patches More Zero-Days Used in 'Sophisticated' Attack
Mon, 15 Dec 2025 21:25:20 GMT
Think Like an Attacker: Cybersecurity Tips From a CISO
Mon, 15 Dec 2025 20:07:48 GMT
Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files
Mon, 15 Dec 2025 15:33:15 GMT
The CISO-COO Partnership: Protecting Operational Excellence
Fri, 12 Dec 2025 21:12:13 GMT
React2Shell Exploits Flood the Internet as Attacks Continue
Fri, 12 Dec 2025 20:11:43 GMT
Vibe Coding: Innovation Demands Vigilance
Fri, 12 Dec 2025 20:07:23 GMT
Microsoft Will Bundle Security Copilot With M365 Enterprise Licenses
Fri, 12 Dec 2025 19:32:42 GMT
Supply Chain Attacks Targeting GitHub Actions Increased in 2025
Fri, 12 Dec 2025 18:37:53 GMT
Are Trade Concerns Trumping US Cybersecurity?
Fri, 12 Dec 2025 14:00:00 GMT
Hamas-Linked Hackers Probe Middle Eastern Diplomats
Fri, 12 Dec 2025 07:00:00 GMT
Money Mules Require Banks to Switch From Defense to Offense
Thu, 11 Dec 2025 23:13:38 GMT
Encouraging Industry Voices to Write for the Commentary Section
Thu, 11 Dec 2025 22:48:10 GMT
Attackers Exploited Gogs Zero-Day Flaw for Months
Thu, 11 Dec 2025 20:11:43 GMT
AI in OT Sparks Cascade of Complex Challenges
Thu, 11 Dec 2025 14:50:59 GMT
Copilot's No-Code AI Agents Liable to Leak Company Data
Thu, 11 Dec 2025 10:00:00 GMT
Storm-0249 Abuses EDR Processes in Stealthy Attacks
Wed, 10 Dec 2025 21:59:32 GMT
Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
Mon, 29 Dec 2025 19:59:26 +0000
New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
Mon, 29 Dec 2025 19:40:32 +0000
Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
Mon, 29 Dec 2025 17:55:43 +0000
2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers
Mon, 29 Dec 2025 15:25:37 +0000
New Vulnerabilities in Bluetooth Headphones Let Hackers Hijack Connected Smartphone
Mon, 29 Dec 2025 15:19:19 +0000
Hacktivist Proxy Operations Emerge as a Repeatable Model of Geopolitical Cyber Pressure
Mon, 29 Dec 2025 15:04:58 +0000
Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach
Mon, 29 Dec 2025 14:15:29 +0000
Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation
Mon, 29 Dec 2025 10:37:11 +0000
MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847)
Mon, 29 Dec 2025 08:24:05 +0000
OpenAI Hardened ChatGPT Atlas Against Prompt Injection Attacks
Mon, 29 Dec 2025 07:56:15 +0000