CyberGate CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
HUB access
CyberGate CyberGate
HUB access
CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
shape
shape
shape
shape

Latest cybersecurity news

  1. Home
  2. Page
Updated on December 13, 2023

Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

April 22, 2026 No Comments

Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that’s distributed via a theme related to India’s banking sector. “The backdoor

Read More »

Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape

April 22, 2026 No Comments

A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code execution. The vulnerability, tracked as CVE-2026-5752,

Read More »

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

April 21, 2026 No Comments

Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) operation have been observed attempting to deploy a known proxy malware called SystemBC. According to new research

Read More »

22 BRIDGE:BREAK Flaws Expose 20,000 Lantronix and Silex Serial-to-IP Converters

April 21, 2026 No Comments

Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters from Lantronix and Silex that could be exploited to hijack susceptible devices

Read More »

Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

April 21, 2026 No Comments

A third individual who was employed as a ransomware negotiator has pleaded guilty to conducting ransomware attacks against U.S. companies in 2023. Angelo Martino, 41,

Read More »

5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time

April 21, 2026 No Comments

Security teams often present MTTR as an internal KPI. Leadership sees it differently: every hour a threat dwells inside the environment is an hour of

Read More »
Load More