
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 82 articles
Browser Extensions A Silent Threat Leaking Corporate Data
From grammar tools to the latest AI assistants, browser extensions have become indispensable. But a new report reveals...
Read More
PyPI Package Caught Hijacking Crypto Trades on MEXC
A malicious package discovered on the Python Package Index (PyPI) was designed to intercept cryptocurrency trades made...
Read More
North Korean Hackers Target Crypto Coders with Deceptive Malware
A North Korean hacking group, believed to be responsible for the large-scale Bybit breach earlier this year, is now...
Read More
Healthcare and Pharma Under Attack From Sneaky ResolverRAT Malware
A stealthy new remote access trojan (RAT) dubbed ResolverRAT is actively targeting the healthcare and pharmaceutical...
Read More
Phishing Attacks Now Verify Your Email Before Stealing Credentials
A sophisticated phishing campaign is making it harder to spot scams, with attackers now checking if your email address...
Read More
AI-Powered Cyberattacks Demand a Rapid Security Response
The cybersecurity landscape is transforming at breakneck speed, thanks to artificial intelligence. Malicious actors are...
Read More
Suspected Pakistan-Backed Hackers Hit India with New CurlBack RAT
Indian organizations are under renewed assault from a threat group believed to be operating out of Pakistan. Security...
Read More
Fortinet Devices Still Vulnerable After Patching, Hackers Retain Access
Even after applying security updates, some Fortinet FortiGate devices remain susceptible to attack, according to a new...
Read More