
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 136 articles
Commvault Bug Exploited in the Wild Lands on CISA's Must-Patch List
A critical vulnerability in Commvault Command Center is now under active attack, prompting the U.S. Cybersecurity and...
Read More
Apple Patches AirPlay Flaws That Could Have Allowed Remote Takeover
Apple has released fixes for critical vulnerabilities in its AirPlay technology, a popular wireless streaming protocol....
Read More
Golden Chickens Malware Upgrade Targets Crypto Wallets, Browser Data
The cybercrime group Golden Chickens is back with an evolved malware strain, TerraStealerV2, designed to pilfer browser...
Read More
Supply Chain Attack Wipes Linux Disks with Malicious Go Modules
A sophisticated supply chain attack is leveraging booby-trapped Go modules to deliver disk-wiping malware to Linux...
Read More
Iranian Hackers Lurked in Middle East Infrastructure for Two Years
A cyber espionage campaign, allegedly backed by the Iranian government, infiltrated a critical national infrastructure...
Read More
Yemeni Hacker Indicted for Black Kingdom Ransomware Attacks
A Yemeni national is facing U.S. federal charges for allegedly unleashing the Black Kingdom ransomware, impacting an...
Read More
TikTok Hit With Massive Fine Over EU User Data Transfers
TikTok is facing a hefty €530 million penalty after Ireland's Data Protection Commission (DPC) found the social media...
Read More
Bogus WordPress Security Plugin Grants Hackers Admin Control
A malicious campaign is exploiting WordPress users by disguising malware as a legitimate security plugin, researchers...
Read More