Blog

Blog
Ransomware Operations Leverage Skitnet Malware for Covert Data Exfiltration and Remote Access Capabilities

Several ransomware groups are actively deploying a malware known as Skitnet as part of their post-exploitation tactics aimed at exfiltrating…

Blog
Important Chrome Update: Addressing Critical Actively Exploited Vulnerability

Google has implemented an urgent update for the Chrome browser to address a significant vulnerability that is currently being actively…

Blog
Mozilla Addresses Firefox Zero-Day Vulnerabilities Exploited During Hacking Competition

Mozilla has released urgent security updates to rectify two critical zero-day vulnerabilities in Firefox, which were demonstrated at the recent…

Blog
Cybercriminals Generate $1,078,750 Through Exploitation of 28 Zero-Day Vulnerabilities at Pwn2Own Berlin

The Pwn2Own Berlin 2025 hacking competition has successfully concluded, with security researchers collectively earning $1,078,750 by exploiting 29 zero-day vulnerabilities,…

Blog
GDPR Amendments May Compromise Core Principles, Civil Society Alerts

Many civil society organizations express significant concern about the European Commission’s proposal to amend the General Data Protection Regulation (GDPR),…

Blog
Zimperium Discovers Over 40,000 iOS Applications Misusing Private Entitlements

A recent analysis by Zimperium highlights an escalating array of threats impacting iOS devices, with particular emphasis on vulnerabilities associated…