Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery
APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures
Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems
Florida Man Enters the Encryption Wars
ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware
Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States
ICE Is Paying Palantir $30 Million to Build ‘ImmigrationOS’ Surveillance Platform
Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader
AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach
Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT
CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download
Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates
New Jersey Sues Discord for Allegedly Failing to Protect Children
State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns
Artificial Intelligence – What's all the fuss?
Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution
Blockchain Offers Security Benefits – But Don't Neglect Your Passwords
This ‘College Protester’ Isn’t Real. It’s an AI-Powered Undercover Bot for Cops
© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.