
Blog
-
Dangling DNS Attack Let Hackers Gain Control Over Organization’s Subdomain
Cybersecurity experts have identified a growing threat vector where attackers exploit improperly configured or abandoned DNS records to hijack organizational…
-
Hackers Mimic Google Chrome Install Page on Google Play to Deploy Android Malware
Security researchers have uncovered a sophisticated malware campaign targeting Android users through fake Google Chrome installation pages.Cybercriminals have created deceptive…
-
Cybersecurity Weekly Recap: Key Updates on Attacks, Vulnerabilities, & Data Breaches
Welcome to this week’s Cybersecurity Newsletter, providing you with the latest updates and essential insights from the rapidly evolving field…
-
Threat Actors Manipulate Search Results to Direct Users to Malicious Websites
The digital landscape has become increasingly perilous as cybercriminals develop sophisticated methods to manipulate search engine results, directing unsuspecting users…
-
RansomHub Ransomware Group Compromised 84 Organization, New Groups Emerging
In a significant development within the cybersecurity landscape, the RansomHub ransomware group has emerged as a major threat in March…
-
HelloKitty Ransomware Resurafced Targeting Windows, Linux, & ESXi Environments
Cybersecurity experts have detected a concerning revival of the HelloKitty ransomware, with new variants actively targeting Windows, Linux, and ESXi…
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 41
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape————————————————————————————————————————————-[Lazarus Expands…
-
Security Affairs newsletter Round 519 by Pierluigi Paganini – INTERNATIONAL EDITION
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…
-
Threat Actors Use Email Bombing Attacks to Bypass Security Tools & Hide Activity
Email bombing attacks have emerged as a sophisticated technique in cybercriminals’ arsenals, designed to overwhelm targets’ inboxes while concealing more…
-
Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248), (Sat, Apr 12th)
[Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248)](/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253248/31850/)===============================================================================================================================================================* * [](http://www.facebook.com/sharer.php?u=https%3A%2F%2Fisc.sans.edu%2Fforums%2Fdiary%2F31850 ‘Share on Facebook’)* [](http://twitter.com/share?text=Exploit%20Attempts%20for%20Recent%20Langflow%20AI%20Vulnerability%20%28CVE-2025-3248%29&url=https%3A%2F%2Fisc.sans.edu%2Fforums%2Fdiary%2F31850&via=SANS_ISC ‘Share on Twitter’) **Published** : 2025-04-12.…

