CyberGate CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
HUB access
CyberGate CyberGate
HUB access
CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
shape
shape
shape
shape

Latest cybersecurity news

  1. Home
  2. Page
Updated on December 13, 2023

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

February 4, 2026 No Comments

Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall

Read More »

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

February 4, 2026 No Comments

Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of “disciplined tradecraft and clever abuse of legitimate

Read More »

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

February 4, 2026 No Comments

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia

Read More »

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

February 4, 2026 No Comments

An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge: Identity Lives Outside the Identity Stack Identity and access

Read More »

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

February 4, 2026 No Comments

Many incident response failures do not come from a lack of tools, intelligence, or technical skills. They come from what happens immediately after detection, when

Read More »

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

February 4, 2026 No Comments

Microsoft has warned that information-stealing attacks are “rapidly expanding” beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted

Read More »
Load More