Curated Cybersecurity RSS Feeds

CyberSec News: Curated Sources | Latest Trends | Showing last 24h

X

OAuth Attacks Target Microsoft 365, GitHub

In a cyber twist, attackers behind two of the campaigns are using the apps to redirect users to phishing and malware distribution sites.

X

ClickFix Attack Compromises 100+ Car Dealership Sites

The ClickFix attack tactic seems to be gaining traction among threat actors.

X

Lexmark Expands Print Security Services Worldwide

No content available.

X

Varonis Acquires Cyral to Reinvent Database Activity Monitoring

No content available.

X

Denmark Warns of Increased Cyber Espionage Against Telecom Sector

A new threat assessment from the Danish Civil Protection Authority (SAMSIK) warned of cyberattacks targeting the telecommunications sector after citing a wave of incidents hitting European organizations the past few years.

X

BlackLock ransomware claims nearly 50 attacks in two months

A ransomware-as-a-service (RaaS) operation called 'BlackLock' has emerged as one of the more active ransomware operations of 2025. [...]

X

Telegram CEO leaves France temporarily as criminal probe continues

French authorities have allowed Pavel Durov, Telegram's CEO and founder, to temporarily leave the country while criminal activity on the messaging platform is still under investigation. [...]

X

Threat actors rapidly exploit new Apache Tomcat flaw following PoC release

Threat actors began exploiting a recently disclosed Apache Tomcat vulnerability immediately after the release of a PoC exploit code. A newly disclosed Apache Tomcat vulnerability, tracked as CVE-2025-24813, is being actively exploited just 30 hours after a public Po...

X

Microsoft: New RAT malware used for crypto theft, reconnaissance

​Microsoft has discovered a new remote access trojan (RAT) that employs "sophisticated techniques" to avoid detection, ensure persistence, and extract sensitive information data. [...]

X

Apache Tomcat RCE Vulnerability Under Fire With 2-Step Exploit

The researchers who discovered the initial assault warned that the simple, staged attack is just the beginning for advanced exploit sequences that will test cyber defenses in new and more difficult ways.