
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 147 articles
MystRodX Backdoor Hides in DNS and ICMP, Giving Hackers Evasive Access
A sophisticated new backdoor dubbed MystRodX is making waves in the cybersecurity community. Researchers have uncovered...
Read More
Ukrainian Network Suspected in Wave of VPN and RDP Hacking Attempts
A Ukrainian-based IP network is under scrutiny after researchers detected a significant surge in brute-force and...
Read More
Silver Fox Gang Weaponizes Legitimate Driver to Spread ValleyRAT
A sophisticated hacking group dubbed Silver Fox is using a clever trick to bypass security defenses: they're exploiting...
Read More
Deleted VS Code Extensions Can Be Resurrected by Attackers, Experts Warn
A security vulnerability in the Visual Studio Code Marketplace could allow malicious actors to hijack the names of...
Read More
China-linked Hackers Exploit Cisco, Ivanti, and Palo Alto Networks to Breach Hundreds of Orgs
A sophisticated hacking group, believed to be backed by China and dubbed Salt Typhoon, is actively compromising...
Read More
S1ngularity Attack Compromises Nx Build System, Exposing Thousands of Credentials
Developers using the Nx build system are urged to update immediately following a supply chain attack. Malicious...
Read More
ClickFix Malware Bypasses CAPTCHAs for Widespread Attacks
A clever social engineering scheme called ClickFix has been spreading rapidly for the past year, thanks to its ability...
Read More
Android Patches Plug Actively Exploited Qualcomm Security Holes
Android devices are getting a crucial security boost this month, with Google's latest updates tackling a range of...
Read More