News
A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication platform called ...
The suspect's name was not disclosed. But he is said to have been detained after a search of his residence in Moldova. In at least one instance, the individual conducted a ransomware attack on the ...
"If you run AsusSetup.exe with the -s flag (DriverHub calls it using this to do a silent install), it will execute whatever ...
The attacks targeted IoT devices susceptible to known security flaws to deploy a malware called TheMoon. The development ...
"Instead of relying on traditional phishing or cracked software sites, they build convincing AI-themed platforms – often ...
The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an ...
The separation of high value, highly sensitive forests in Active Directory from other systems and assets is critically ...
OtterCookie v3 has been found to incorporate a new upload module to send files matching a predefined set of extensions to the ...
The exploitation of CVE-2025-29824 also points to the trend of ransomware actors using zero-days to infiltrate targets. Last ...
"The spam message uses the Brazilian electronic invoice system, NF-e, as a lure to entice users into clicking hyperlinks and ...
Malicious npm packages targeting Cursor macOS users stole credentials and disabled updates, impacting 3,200+ downloads.
Nation-state intrusions. Deepfake-ready malware. AI-powered influence ops. New CVEs, old threats reborn, and spyware with ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results