
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 159 articles
China-linked Hackers Exploit Cisco, Ivanti, and Palo Alto Networks to Breach Hundreds of Orgs
A sophisticated hacking group, believed to be backed by China and dubbed Salt Typhoon, is actively compromising...
Read More
S1ngularity Attack Compromises Nx Build System, Exposing Thousands of Credentials
Developers using the Nx build system are urged to update immediately following a supply chain attack. Malicious...
Read More
ClickFix Malware Bypasses CAPTCHAs for Widespread Attacks
A clever social engineering scheme called ClickFix has been spreading rapidly for the past year, thanks to its ability...
Read More
Android Patches Plug Actively Exploited Qualcomm Security Holes
Android devices are getting a crucial security boost this month, with Google's latest updates tackling a range of...
Read More
Cursor AI Code Editor Exposed to Remote Code Execution Risk
A serious security vulnerability has been discovered in Cursor, the increasingly popular AI-assisted code editor....
Read More
Moscow Embassies Targeted in Sophisticated ISP-Level Attack Linked to Secret Blizzard
A Russian hacking group, identified as Secret Blizzard, is suspected of launching a complex cyber espionage operation...
Read More
Phishers Hide Behind Proofpoint, Intermedia to Snag Microsoft 365 Credentials
A sophisticated phishing campaign is using legitimate link wrapping services from Proofpoint and Intermedia to cloak...
Read More
North Korean Hackers Target Crypto Firms With Elaborate Job Scams
A North Korean hacking group, tracked as UNC4899, reportedly stole millions in cryptocurrency by infiltrating two...
Read More