Cybersecurity researchers have released Zig Strike, a sophisticated offensive toolkit designed to test organizational defenses by bypassing modern security solutions including antivirus (AV), next-generation antivirus (NGAV), and Endpoint Detection and Response (XDR/EDR) systems.
The toolkit, developed over six months, represents a significant evolution in...
A newly discovered set of critical vulnerabilities affecting millions of Bluetooth headphones and earbuds from major manufacturers has exposed users to potential eavesdropping and device hijacking attacks.
Security researchers have identified serious vulnerabilities in devices using Airoha Systems on a Chip (SoCs), which power...
In a recent cybersecurity landscape alert, threat actors identified with the TAG-140 group, a cluster previously linked to notorious groups including SideCopy and Transparent Tribe (APT36, MYTHIC LEOPARD), have been detected deploying an upgraded version of the DRAT remote access trojan (RAT), now dubbed...
Security researchers and national cyber defence authorities are raising the alarm over a sophisticated post-exploitation tool named “SHOE RACK,” which is actively targeting Fortinet 100D series firewalls.
The National Cyber Security Centre (NCSC) has released a detailed advisory dated June 18, 2025, noting the...
In a striking digital assault with significant geopolitical implications, suspected Israeli state-backed cyber operatives masquerading as Iranian opposition hacktivists under the moniker Gonjeshke Darande successfully infiltrated Nobitex, Iran’s largest cryptocurrency exchange, on June 18, 2025.
Rather than seeking financial profit, the hackers chose to...
Cybercriminals have targeted thousands of individuals across the U.S. by exploiting one of the most trusted government agencies: the Social Security Administration (SSA).
Security analysts at CyberArmor have recently tracked a sophisticated malware campaign that impersonated official SSA correspondence, resulting in more than 2,000...