admin
April 17, 2025
A critical security vulnerability has been disclosed in the Erlang/Open Telecom Platform (OTP) SSH implementation that could...
Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers

3 min read
admin
April 17, 2025
Microsoft is calling attention to an ongoing malvertising campaign that makes use of Node.js to deliver malicious...
admin
April 17, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting SonicWall Secure...
admin
April 17, 2025
Apple on Wednesday released security updates for iOS, iPadOS, macOS Sequoia, tvOS, and visionOS to address two...
admin
April 16, 2025
Threat actors are leveraging an artificial intelligence (AI) powered presentation platform named Gamma in phishing attacks to...
admin
April 16, 2025
Introduction
Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue...
admin
April 16, 2025
Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service...
admin
April 16, 2025
Google on Wednesday revealed that it suspended over 39.2 million advertiser accounts in 2024, with a majority...
admin
April 16, 2025
The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities and...
admin
April 16, 2025
Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as part...
admin
April 16, 2025
Intro: Why hack in when you can log in?
SaaS applications are the backbone of modern organizations, powering...
admin
April 16, 2025
Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp...
admin
April 15, 2025
The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a...
Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence

2 min read
admin
April 15, 2025
A critical security vulnerability has been disclosed in the Apache Roller open-source, Java-based blogging server software that...
admin
April 15, 2025
Everybody knows browser extensions are embedded into nearly every user’s daily workflow, from spell checkers to GenAI...
admin
April 15, 2025
Cybersecurity researchers have disclosed a malicious package uploaded to the Python Package Index (PyPI) repository that's designed...
admin
April 15, 2025
The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has...
Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability

2 min read
admin
April 15, 2025
A recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution,...
admin
April 15, 2025
Meta has announced that it will begin to train its artificial intelligence (AI) models using public data...
admin
April 14, 2025
Attackers aren’t waiting for patches anymore — they are breaking in before defenses are ready. Trusted security...