CISA has mandated federal agencies to patch a critical Dell vulnerability within three days, as it is under active exploitation…
Read More »GTIG
Entity category: organization
A China-linked cyberespionage group exploited a critical Dell software vulnerability (CVE-2026-22769) for over a year, using it to implant stealthy…
Read More »State-sponsored hacking groups from China, Iran, North Korea, and Russia are using Google's Gemini AI to conduct reconnaissance, craft phishing…
Read More »Nation-state hacking groups from Iran, China, and North Korea are increasingly using AI tools like Google's Gemini to enhance offensive…
Read More »Google dismantled a major cybercrime operation that hijacked millions of personal devices to create a global proxy network, which hackers…
Read More »Google and partners dismantled the IPIDEA residential proxy network, which was secretly routing malicious traffic through millions of compromised devices…
Read More »Google dismantled the IPIDEA residential proxy network, a major tool for cybercriminals to hide malicious traffic by routing it through…
Read More »Google dismantled the Ipidea residential proxy network, which was used by over 550 hacker groups to hide attacks by routing…
Read More »A critical path traversal vulnerability (CVE-2025-8088) in WinRAR allows attackers to hide malicious files in archives and place them in…
Read More »The cybersecurity landscape in 2026 will be defined by the weaponization of AI, leading to faster, more adaptive, and harder-to-detect…
Read More »A critical security vulnerability (CVE-2025-12480) in Gladinet's Triofox platform allows attackers to execute malicious code by exploiting improper access control…
Read More »Google has identified a new generation of AI-powered malware that rewrites its own code during attacks, making it more resilient…
Read More »Google has identified new AI-driven malware families like PromptFlux and PromptSteal that use large language models to dynamically generate malicious…
Read More »Google has identified a new generation of AI-powered malware, such as PromptFlux and PromptSteal, that dynamically rewrites its own code…
Read More »A critical remote code execution vulnerability (CVE-2025-59287) in Microsoft's WSUS is being actively exploited, affecting Windows Server versions from 2012…
Read More »Star Blizzard, a Russian state-sponsored hacking group, has escalated cyber-espionage by hiding malware like NoRobot, YesRobot, and MaybeRobot within fake…
Read More »A North Korean hacking group is using EtherHiding, a blockchain-based method that embeds malware in smart contracts, making the blockchain…
Read More »EtherHiding is a technique used by North Korean hackers to hide malware on public blockchains, making it hard for authorities…
Read More »The Clop ransomware group breached Oracle's E-Business Suite starting around August 9, exploiting a zero-day vulnerability (CVE-2025-61882) to steal corporate…
Read More »A sophisticated extortion campaign is targeting corporate executives with emails alleging data theft from Oracle E-Business Suite systems, tracked by…
Read More »


















