
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 89 articles
North Korean Hackers Use Crypto Job Scams to Deploy Malware
A North Korean hacking group is disguising itself as legitimate cryptocurrency firms to lure unsuspecting job seekers...
Read More
SAP NetWeaver Under Attack Critical Flaw Lets Hackers Plant Web Shells
A serious security hole in SAP NetWeaver is being actively exploited, allowing attackers to inject malicious web shells...
Read More
Ruby Servers at Risk From Rack::Static Flaws, Experts Warn
Security researchers have uncovered a trio of vulnerabilities in Rack, a popular Ruby web server interface, that could...
Read More
North Korean Lazarus Group Targets South Korean Companies Exploiting Software Vulnerabilities
The notorious North Korean hacking group Lazarus is suspected of breaching at least six South Korean organizations in a...
Read More
Stealth Linux Rootkit Exploits io_uring to Evade Detection
A novel rootkit, dubbed Curing, is demonstrating how attackers can use Linux's advanced io_uring asynchronous I/O...
Read More
Darcula Phishing Service Now Weaponized with AI
The Darcula phishing-as-a-service platform just got a whole lot more dangerous. Cybercriminals using the service now...
Read More
North Korean Hackers Drain $137 Million in TRON Cryptocurrency Heist
A massive, coordinated phishing attack has reportedly netted North Korean hacking groups a staggering $137 million from...
Read More
Fake Job Offers Used to Spread Iranian Malware in Israel
An Iranian hacking group, tracked as UNC2428, is suspected of using a sophisticated social engineering campaign...
Read More