CyberGate CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
HUB access
CyberGate CyberGate
HUB access
CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
shape
shape
shape
shape

Latest cybersecurity news

  1. Home
  2. Page
Updated on December 13, 2023

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

March 30, 2026 No Comments

Three threat activity clusters aligned with China have targeted a government organization in Southeast Asia as part of what has been described as a “complex

Read More »

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack

March 28, 2026 No Comments

Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation

Read More »

Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

March 28, 2026 No Comments

A recently disclosed critical security flaw impacting Citrix NetScaler ADC and NetScaler Gateway is witnessing active reconnaissance activity, according to Defused Cyber and watchTowr. The

Read More »

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

March 28, 2026 No Comments

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting F5 BIG-IP Access Policy Manager (APM) to its Known

Read More »

TA446 Deploys Leaked DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

March 28, 2026 No Comments

Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit

Read More »

Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

March 27, 2026 No Comments

Apple is now sending Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS to alert users of web-based attacks and

Read More »
Load More