
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 136 articles
SAP NetWeaver Under Attack Critical Flaw Lets Hackers Plant Web Shells
A serious security hole in SAP NetWeaver is being actively exploited, allowing attackers to inject malicious web shells...
Read More
Ruby Servers at Risk From Rack::Static Flaws, Experts Warn
Security researchers have uncovered a trio of vulnerabilities in Rack, a popular Ruby web server interface, that could...
Read More
North Korean Lazarus Group Targets South Korean Companies Exploiting Software Vulnerabilities
The notorious North Korean hacking group Lazarus is suspected of breaching at least six South Korean organizations in a...
Read More
Stealth Linux Rootkit Exploits io_uring to Evade Detection
A novel rootkit, dubbed Curing, is demonstrating how attackers can use Linux's advanced io_uring asynchronous I/O...
Read More
Darcula Phishing Service Now Weaponized with AI
The Darcula phishing-as-a-service platform just got a whole lot more dangerous. Cybercriminals using the service now...
Read More
North Korean Hackers Drain $137 Million in TRON Cryptocurrency Heist
A massive, coordinated phishing attack has reportedly netted North Korean hacking groups a staggering $137 million from...
Read More
Fake Job Offers Used to Spread Iranian Malware in Israel
An Iranian hacking group, tracked as UNC2428, is suspected of using a sophisticated social engineering campaign...
Read More
Russian Military Targeted by Android Spyware Masquerading as Mapping App
A new Android spyware campaign is targeting Russian military personnel, researchers warn. The malware is cleverly...
Read More