
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 147 articles
Cursor AI Code Editor Exposed to Remote Code Execution Risk
A serious security vulnerability has been discovered in Cursor, the increasingly popular AI-assisted code editor....
Read More
Moscow Embassies Targeted in Sophisticated ISP-Level Attack Linked to Secret Blizzard
A Russian hacking group, identified as Secret Blizzard, is suspected of launching a complex cyber espionage operation...
Read More
Phishers Hide Behind Proofpoint, Intermedia to Snag Microsoft 365 Credentials
A sophisticated phishing campaign is using legitimate link wrapping services from Proofpoint and Intermedia to cloak...
Read More
North Korean Hackers Target Crypto Firms With Elaborate Job Scams
A North Korean hacking group, tracked as UNC4899, reportedly stole millions in cryptocurrency by infiltrating two...
Read More
Hackers Use Raspberry Pi Over 4G to Target ATM Networks, Deploy Rootkit
A financially driven hacking group, tracked as UNC2891, is deploying a sophisticated attack on ATM networks, using a...
Read More
FunkSec Ransomware Victims Get a Break Decryptor Released as Group Fades
Victims of the FunkSec ransomware can now breathe a sigh of relief. With the cybercriminal group seemingly gone silent,...
Read More
Apple Fixes Safari Flaw Previously Targeted in Chrome Zero-Day Attacks
Apple rolled out security updates across its software lineup this week, addressing a vulnerability also exploited as a...
Read More
Dahua Camera Vulnerabilities Allowed Hackers to Seize Control
Security researchers recently uncovered serious vulnerabilities in Dahua smart camera firmware, now patched, that could...
Read More