Latest News
Threat actors are actively exploiting a critical security flaw in "Alone – Charity Multipurpose Non-profit WordPress Theme" to take over susceptible sites. The vulnerability, tracked as CVE-2025-5394, carries a CVSS score of 9.8. Security researcher Thái An has been credited with discovering and reporting the bug. According to Wordfence, the shortcoming relates to an arbitrary file upload
A swath of copycat Korean apps are hiding spyware, occasionally leading to highly personal, disturbing extortions.
Attackers are becoming faster at exploiting vulnerabilities, but this startup seeks to stop threats before they lead to breaches.
The deal shakes up the identity and access management landscape and expands Palo Alto Networks' footprint in the cybersecurity market.
July Linux Patch Wednesday. This time, there are 470 vulnerabilities, slightly fewer than in June. Of these, 291 are in the Linux Kernel. One vulnerability shows signs of being exploited in the wild (CISA KEV): 🔻 SFB – Chromium (CVE-2025-6554) There are also 36 (❗️) vulnerabilities for which public exploits are available or suspected to […]
The US government is throwing the book at even midlevel cybercriminals. Is it just — and is it working?
VPN use is skyrocketing across the UK as the region's Online Safety Act places age verification controls on adult websites.
VPN use is skyrocketing across the UK as the region's Online Safety Act places age verification controls on adult websites.
An unsealed indictment associated with the Chinese threat group shows its members worked for companies closely aligned with the PRC as part of a larger contractor ecosystem.
Cybersecurity trends in 2025 reveal rising AI threats, quantum risks, and supply chain attacks, pushing firms to adapt or face major data and financial losses.