Attackers are using typosquatted Go packages to deploy malware on Linux and macOS, targeting financial developers.
Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) ...
CISA adds five exploited vulnerabilities to its KEV catalog, including flaws in Cisco, Microsoft, and Progress software.
Broadcom patches three actively exploited VMware flaws, including a critical (CVSS 9.3) bug enabling code execution. Update ...
AI-powered credential stuffing could worsen in 2025, as attackers scale automation to breach accounts. Defending identity security is now more critica ...
Hackers used a compromised Indian electronics firm’s email to deliver a Golang backdoor in a UAE-targeted phishing campaign.
Google has released its monthly Android Security Bulletin for March 2025 to address a total of 44 vulnerabilities, including ...
Mozilla updates Firefox Terms of Use again after privacy concerns over broad data rights language. Company clarifies no ...
Threat actors use ClickFix to spread Havoc C2 malware via SharePoint and Microsoft Graph API, while scammers exploit Google ...
JavaGhost exploits AWS misconfigurations to run phishing campaigns via SES and WorkMail, evading email protections ...
U.K. ICO launches investigations into TikTok, Reddit, and Imgur over concerns about children's data privacy and online safety ...
Get exclusive insights on cyber attacks—including expert analysis on zero-day exploits, AI breaches, and crypto hacks—in our ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results