
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 64 articles
Windows Task Scheduler Riddled With Privilege Escalation Bugs
Security researchers have unearthed four critical vulnerabilities in the Windows Task Scheduler, a core system...
Read More
Google Cracks Down Blocking Billions of Bad Ads This Year
Google announced Wednesday it has already taken down a staggering 5.1 billion malicious ads and suspended over 39...
Read More
AI Presentation Tool Gamma Exploited in Microsoft SharePoint Phishing Scheme
Cybercriminals are now using the AI-driven presentation platform Gamma to craft convincing phishing campaigns, tricking...
Read More
BPFDoor Backdoor Gets Sneakier With New Controller for Linux Attacks
A stealthier version of the BPFDoor backdoor is now circulating, featuring a new controller component that allows...
Read More
Apache Roller Hit by Severe Flaw Allowing Persistent Unauthorized Access
A serious vulnerability has been discovered in Apache Roller, the popular Java-based blogging platform, potentially...
Read More
Chinese Hackers Deploy SNOWLIGHT Malware Against Linux Servers
A hacking group with suspected ties to China, tracked as UNC5174, is actively targeting Linux servers with a...
Read More
Browser Extensions A Silent Threat Leaking Corporate Data
From grammar tools to the latest AI assistants, browser extensions have become indispensable. But a new report reveals...
Read More
PyPI Package Caught Hijacking Crypto Trades on MEXC
A malicious package discovered on the Python Package Index (PyPI) was designed to intercept cryptocurrency trades made...
Read More