
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 136 articles
Deleted VS Code Extensions Can Be Resurrected by Attackers, Experts Warn
A security vulnerability in the Visual Studio Code Marketplace could allow malicious actors to hijack the names of...
Read More
China-linked Hackers Exploit Cisco, Ivanti, and Palo Alto Networks to Breach Hundreds of Orgs
A sophisticated hacking group, believed to be backed by China and dubbed Salt Typhoon, is actively compromising...
Read More
S1ngularity Attack Compromises Nx Build System, Exposing Thousands of Credentials
Developers using the Nx build system are urged to update immediately following a supply chain attack. Malicious...
Read More
ClickFix Malware Bypasses CAPTCHAs for Widespread Attacks
A clever social engineering scheme called ClickFix has been spreading rapidly for the past year, thanks to its ability...
Read More
Android Patches Plug Actively Exploited Qualcomm Security Holes
Android devices are getting a crucial security boost this month, with Google's latest updates tackling a range of...
Read More
Cursor AI Code Editor Exposed to Remote Code Execution Risk
A serious security vulnerability has been discovered in Cursor, the increasingly popular AI-assisted code editor....
Read More
Moscow Embassies Targeted in Sophisticated ISP-Level Attack Linked to Secret Blizzard
A Russian hacking group, identified as Secret Blizzard, is suspected of launching a complex cyber espionage operation...
Read More
Phishers Hide Behind Proofpoint, Intermedia to Snag Microsoft 365 Credentials
A sophisticated phishing campaign is using legitimate link wrapping services from Proofpoint and Intermedia to cloak...
Read More