
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 82 articles
Nation-State Hackers Exploit ClickFix in Sophisticated Malware Attacks
Elite hacking teams with suspected ties to Iran, North Korea, and Russia are using a clever social engineering trick...
Read More
Blockchain's Security Promise Passwords Still Matter
Blockchain technology, famous for powering cryptocurrencies like Bitcoin, is making waves in online authentication....
Read More
Windows Task Scheduler Riddled With Privilege Escalation Bugs
Security researchers have unearthed four critical vulnerabilities in the Windows Task Scheduler, a core system...
Read More
Google Cracks Down Blocking Billions of Bad Ads This Year
Google announced Wednesday it has already taken down a staggering 5.1 billion malicious ads and suspended over 39...
Read More
AI Presentation Tool Gamma Exploited in Microsoft SharePoint Phishing Scheme
Cybercriminals are now using the AI-driven presentation platform Gamma to craft convincing phishing campaigns, tricking...
Read More
BPFDoor Backdoor Gets Sneakier With New Controller for Linux Attacks
A stealthier version of the BPFDoor backdoor is now circulating, featuring a new controller component that allows...
Read More
Apache Roller Hit by Severe Flaw Allowing Persistent Unauthorized Access
A serious vulnerability has been discovered in Apache Roller, the popular Java-based blogging platform, potentially...
Read More
Chinese Hackers Deploy SNOWLIGHT Malware Against Linux Servers
A hacking group with suspected ties to China, tracked as UNC5174, is actively targeting Linux servers with a...
Read More