CyberGate CyberGate
  • Home 
  • News 
  • Password Generator 
  • Password Leak Check 
HUB access
CyberGate CyberGate
HUB access
CyberGate
  • Home 
  • News 
  • Password Generator 
  • Password Leak Check 
shape
shape
shape
shape

Latest cybersecurity news

  1. Home
  2. Page
Updated on December 13, 2023

Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks

August 21, 2025 No Comments

Commvault has released updates to address four security gaps that could be exploited to achieve remote code execution on susceptible instances. The list of vulnerabilities,

Read More »

Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages

August 21, 2025 No Comments

Threat actors have been observed leveraging the deceptive social engineering tactic known as ClickFix to deploy a versatile backdoor codenamed CORNFLAKE.V3. Google-owned Mandiant described the

Read More »

Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger

August 21, 2025 No Comments

Cybersecurity researchers have disclosed details of a new malware loader called QuirkyLoader that’s being used to deliver via email spam campaigns an array of next-stage

Read More »

Weak Passwords and Compromised Accounts: Key Findings from the Blue Report 2025

August 21, 2025 No Comments

As security professionals, it’s easy to get caught up in a race to counter the latest advanced adversary techniques. Yet the most impactful attacks often

Read More »

Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft

August 21, 2025 No Comments

A 20-year-old member of the notorious cybercrime gang known as Scattered Spider has been sentenced to ten years in prison in the U.S. in connection

Read More »

Apple Patches CVE-2025-43300 Zero-Day in iOS, iPadOS, and macOS Exploited in Targeted Attacks

August 21, 2025 No Comments

Apple has released security updates to address a security flaw impacting iOS, iPadOS, and macOS that it said has come under active exploitation in the

Read More »
Load More