
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 118 articles
AI Presentation Tool Gamma Exploited in Microsoft SharePoint Phishing Scheme
Cybercriminals are now using the AI-driven presentation platform Gamma to craft convincing phishing campaigns, tricking...
Read More
BPFDoor Backdoor Gets Sneakier With New Controller for Linux Attacks
A stealthier version of the BPFDoor backdoor is now circulating, featuring a new controller component that allows...
Read More
Apache Roller Hit by Severe Flaw Allowing Persistent Unauthorized Access
A serious vulnerability has been discovered in Apache Roller, the popular Java-based blogging platform, potentially...
Read More
Chinese Hackers Deploy SNOWLIGHT Malware Against Linux Servers
A hacking group with suspected ties to China, tracked as UNC5174, is actively targeting Linux servers with a...
Read More
Browser Extensions A Silent Threat Leaking Corporate Data
From grammar tools to the latest AI assistants, browser extensions have become indispensable. But a new report reveals...
Read More
PyPI Package Caught Hijacking Crypto Trades on MEXC
A malicious package discovered on the Python Package Index (PyPI) was designed to intercept cryptocurrency trades made...
Read More
North Korean Hackers Target Crypto Coders with Deceptive Malware
A North Korean hacking group, believed to be responsible for the large-scale Bybit breach earlier this year, is now...
Read More
Healthcare and Pharma Under Attack From Sneaky ResolverRAT Malware
A stealthy new remote access trojan (RAT) dubbed ResolverRAT is actively targeting the healthcare and pharmaceutical...
Read More