Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code8 hours agoBy Guru BaranMore
Surveillance Company Using SS7 Bypass Attack to Track the User's Location Information2 days agoBy Guru BaranMore
Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials4 days agoBy Tushar Subhra DuttaMore
Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware7 days agoBy Tushar Subhra DuttaMore
Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User7 days agoBy Guru BaranMore
CISA Warns of Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems19 hours agoBy Guru BaranMore
Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network10 hours agoBy Tushar Subhra DuttaMore
CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild2 hours agoBy Guru BaranMore
New DCHSpy Android Malware Steals WhatsApp Data, Call Logs, Record Audio and Take PhotosYesterdayBy Guru BaranMore
New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware17 hours agoBy Tushar Subhra DuttaMore
New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords16 hours agoBy Tushar Subhra DuttaMore
GLOBAL GROUP's Golang Ransomware Attacks Windows, Linux, and macOS EnvironmentsYesterdayBy Tushar Subhra DuttaMore
Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RATYesterdayBy Tushar Subhra DuttaMore
ETQ Reliance RCE Vulnerability Enables Full SYSTEM Access Just by Typing a Single Space21 hours agoBy Guru BaranMore
Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users5 hours agoBy Guru BaranMore
Apache Jena Vulnerability Leads to Arbitrary File Access or Manipulation20 hours agoBy Guru BaranMore
ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP ConnectionYesterdayMore
HPE Warns of Aruba Hardcoded Credentials Allowing Attackers to Bypass Device Authentication2 days agoBy Guru BaranMore
Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution22 hours agoBy Guru BaranMore
Threat Actors Leverage Zoho WorkDrive Folder to Deliver Obfuscated PureRAT Malware2 days agoBy Tushar Subhra DuttaMore
Hackers Injected Malicious Firefox Browser Packages to Arch Linux User Repository43 minutes agoBy Guru BaranMore
PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability2 days agoBy Tushar Subhra DuttaMore
New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials4 days agoBy Tushar Subhra DuttaMore
Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices5 days agoBy Tushar Subhra DuttaMore
Lumma Infostealer Steal All Data Stored in Browsers and Selling Them in Underground Markets as Logs4 days agoBy Tushar Subhra DuttaMore
APT41 Hackers Leveraging Atexec and WmiExec Windows Modules to Deploy Malware2 days agoBy Tushar Subhra DuttaMore
Threat Actors Combine Android Malware With Click Fraud Apps to Steal Login CredentialsYesterdayBy Tushar Subhra DuttaMore
New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers4 days agoBy Guru BaranMore
Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges to Global Admin Role5 days agoBy Guru BaranMore
Grafana Vulnerabilities Allow User Redirection to Malicious Sites and Code Execution in Dashboards3 days agoBy Guru BaranMore
Hackers Launch 11.5 Million Attacks on CitrixBleed 2-Compromising Over 100 Organizations5 days agoBy Guru BaranMore
Google's AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation7 days agoBy Guru BaranMore
Microsoft Defender for Office 365 Launches New Dashboard for Enhanced Threat Vector Insights5 days agoMore
Oracle Critical Security Update - 309 Vulnerabilities with 145 Remotely Exploitable Patched7 days agoBy Guru BaranMore
Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites7 days agoBy Tushar Subhra DuttaMore
Livewire Vulnerability Exposes Millions of Laravel Apps to Remote Code Execution Attacks2 days agoMore