UNC3944 Attacking VMware vSphere and Enabling SSH on ESXi Hosts to Reset 'root' Passwords11 hours agoBy Guru BaranMore
Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges to Global Admin Role6 days agoBy Guru BaranMore
Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code2 days agoBy Guru BaranMore
SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access4 days agoBy Guru BaranMore
Snake Keylogger Evades Windows Defender and Scheduled Tasks to Harvest Login Credentials5 days agoBy Tushar Subhra DuttaMore
CISA Warns of Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems2 days agoBy Guru BaranMore
New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS UsersYesterdayBy Tushar Subhra DuttaMore
Clorox Sues IT Provider Cognizant For Simply Giving Employee Password to HackersYesterdayBy Guru BaranMore
Operation CargoTalon Attacking Russian Aerospace & Defense to Deploy EAGLET Implant10 hours agoBy Tushar Subhra DuttaMore
AWS Client VPN for Windows Vulnerability Let Attackers Escalate Privileges9 hours agoBy Guru BaranMore
SonicWall SMA 100 Vulnerabilities Let Attackers Execute Arbitrary JavaScript Code7 hours agoBy Guru BaranMore
Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files21 hours agoBy Tushar Subhra DuttaMore
GitLab Security Update - Patch for Multiple Vulnerabilities in Community and Enterprise Edition7 hours agoMore
New Web3 Phishing Attack Leverages Fake AI Platforms to Steal Usernames and Passwords2 days agoBy Tushar Subhra DuttaMore
Threat Actor Mimo Attacking Magento CMS to Steal Card Details and Bandwidth Monetization12 hours agoBy Tushar Subhra DuttaMore
TP-Link Network Video Recorder Vulnerability Let Attackers Execute Arbitrary Commands43 minutes agoBy Guru BaranMore
New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy5 hours agoBy Tushar Subhra DuttaMore
Stealthy Backdoor in WordPress Plugins Gives Attackers Persistent Access to Websites10 hours agoBy Tushar Subhra DuttaMore
Google Launches OSS Rebuild to Strengthen Security of The Open-Source Package Ecosystems9 hours agoBy Tushar Subhra DuttaMore
NoName057(16)'s Hackers Attacked 3,700 Unique Devices Over Last Thirteen Months4 hours agoBy Tushar Subhra DuttaMore
Key Administrator of World's Most Popular Dark Web Cybercrime Platform ArrestedYesterdayBy Guru BaranMore
Critical Vulnerability in JavaScript Library Exposes Millions of Apps to Code Execution AttacksYesterdayMore
Ransomware Gangs Leveraging RMM Tools to Attack Organizations and Exfiltrate DataYesterdayBy Tushar Subhra DuttaMore
SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups50 minutes agoBy Guru BaranMore
Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login CredentialsYesterdayBy Tushar Subhra DuttaMore
New DCHSpy Android Malware Steals WhatsApp Data, Call Logs, Record Audio and Take Photos2 days agoBy Guru BaranMore
Splunk Details on How to Detect, Mitigate and Respond to CitrixBleed 2 Attack5 hours agoBy Tushar Subhra DuttaMore
GLOBAL GROUP's Golang Ransomware Attacks Windows, Linux, and macOS Environments2 days agoBy Tushar Subhra DuttaMore
ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection2 days agoMore
CISA warns of Google Chromium 0-Day Input Validation Vulnerability Exploited in Attacks2 days agoBy Guru BaranMore
HPE Warns of Aruba Hardcoded Credentials Allowing Attackers to Bypass Device Authentication3 days agoBy Guru BaranMore
First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology1 hour agoBy Tushar Subhra DuttaMore
Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution2 days agoBy Guru BaranMore
New KAWA4096’s Ransomware Leverages Windows Management Instrumentation to Delete Shadow Copies3 days agoBy Tushar Subhra DuttaMore
CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks6 days agoBy Guru BaranMore
New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials5 days agoBy Tushar Subhra DuttaMore
Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices6 days agoBy Tushar Subhra DuttaMore
PoC Exploit Released for Critical NVIDIA AI Container Toolkit Vulnerability3 days agoBy Tushar Subhra DuttaMore
Hackers Injected Malicious Firefox Browser Packages to Arch Linux User RepositoryYesterdayBy Guru BaranMore