admin
July 10, 2025
A high-severity security flaw has been disclosed in ServiceNow's platform that, if successfully exploited, could result in...
admin
July 10, 2025
The Initial Access Broker (IAB) known as Gold Melody has been attributed to a campaign that exploits...
admin
July 9, 2025
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Tuesday sanctioned a member...
admin
July 9, 2025
Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000...
admin
July 9, 2025
A threat actor with suspected ties to India has been observed targeting a European foreign affairs ministry...
admin
July 9, 2025
A Chinese national has been arrested in Milan, Italy, for his alleged links to a state-sponsored hacking...
admin
July 9, 2025
For the first time in 2025, Microsoft's Patch Tuesday updates did not bundle fixes for exploited security...
admin
July 9, 2025
In yet another instance of threat actors repurposing legitimate tools for malicious purposes, it has been discovered...
admin
July 8, 2025
Cybersecurity researchers have discovered an Android banking malware campaign that has leveraged a trojan named Anatsa to...
Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension

4 min read
admin
July 8, 2025
Cybersecurity researchers have flagged a supply chain attack targeting a Microsoft Visual Studio Code (VS Code) extension...
admin
July 8, 2025
From overprivileged admin roles to long-forgotten vendor tokens, these attackers are slipping through the cracks of trust...
admin
July 8, 2025
Cybersecurity researchers are calling attention to a malware campaign that's targeting security flaws in TBK digital video...
admin
July 8, 2025
A newly released report by cybersecurity firm CTM360 reveals a large-scale scam operation utilizing fake news websites—known...
admin
July 8, 2025
Russian organizations have been targeted as part of an ongoing campaign that delivers a previously undocumented Windows...
admin
July 8, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added four security flaws to its Known...
admin
July 7, 2025
Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization (SEO) poisoning techniques to deliver...
admin
July 7, 2025
Everything feels secure—until one small thing slips through. Even strong systems can break if a simple check...
admin
July 7, 2025
If you didn't hear about Iranian hackers breaching US water facilities, it's because they only managed to control...
admin
July 7, 2025
A hacking group with ties other than Pakistan has been found targeting Indian government organizations with a...
admin
July 5, 2025
Threat actors are weaponizing exposed Java Debug Wire Protocol (JDWP) interfaces to obtain code execution capabilities and...