PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy’s BlueSDK Bluetooth stack that, if successfully exploited, could […]
Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy’s BlueSDK Bluetooth stack that, if successfully exploited, could […]
The 2025 Data Risk Report: Enterprises face potentially serious data loss risks from AI-fueled tools. Adopting a unified, AI-driven approach
Securing Data in the AI Era Read More »
A recently disclosed maximum-severity security flaw impacting the Wing FTP Server has come under active exploitation in the wild, according
An Iranian-backed ransomware-as-a-service (RaaS) named Pay2Key has resurfaced in the wake of the Israel-Iran-U.S. conflict last month, offering bigger payouts
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals Read More »
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Citrix NetScaler ADC and
Welcome to this week’s edition of the Threat Source newsletter. We’ve made it halfway through 2025 already! It’s been a
Patch, track, repeat Read More »
Cybersecurity researchers have discovered a critical vulnerability in the open-source mcp-remote project that could result in the execution of arbitrary
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed two vulnerabilities each in Asus Armoury Crate and Adobe Acrobat products.
Asus and Adobe vulnerabilities Read More »
Cryptocurrency users are the target of an ongoing social engineering campaign that employs fake startup companies to trick users into
Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord Read More »