
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 159 articles
Ethereum Smart Contracts Weaponized in npm Package Attack Targeting Crypto Developers
Security researchers have uncovered a sneaky new attack vector: malicious npm packages leveraging Ethereum smart...
Read More
Citrix Under Fire Hackers Race to Exploit Flaws Using AI-Powered Tool
Cybercriminals are wasting no time exploiting the latest Citrix vulnerabilities. Reports indicate attackers are already...
Read More
Iranian Hackers Target Diplomats Worldwide in Embassy Email Breach
A hacking group with suspected ties to Iran has launched a sophisticated spear-phishing attack, compromising email...
Read More
Lazarus Group Unleashes Trio of New Malware Threats
A fresh social engineering campaign is spreading three previously unseen malware strains – dubbed PondRAT,...
Read More
MystRodX Backdoor Hides in DNS and ICMP, Giving Hackers Evasive Access
A sophisticated new backdoor dubbed MystRodX is making waves in the cybersecurity community. Researchers have uncovered...
Read More
Ukrainian Network Suspected in Wave of VPN and RDP Hacking Attempts
A Ukrainian-based IP network is under scrutiny after researchers detected a significant surge in brute-force and...
Read More
Silver Fox Gang Weaponizes Legitimate Driver to Spread ValleyRAT
A sophisticated hacking group dubbed Silver Fox is using a clever trick to bypass security defenses: they're exploiting...
Read More
Deleted VS Code Extensions Can Be Resurrected by Attackers, Experts Warn
A security vulnerability in the Visual Studio Code Marketplace could allow malicious actors to hijack the names of...
Read More