Weaponized Chrome Extension from Webstore With Verification Badge Infected 1.7 Million Users
By Guru Baran
AMD Warns of Transient Scheduler Attacks Affecting Wide Range of Chipsets
By Tushar Subhra Dutta
Infostealers Actively Attacking macOS Users in The Wild to Steal Sensitive Data
By Tushar Subhra Dutta
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits
By Tushar Subhra Dutta & Tushar Subhra
AWS Organizations Mis-scoped Managed Policy Let Hackers To Take Full AWS Organization Control
By Tushar Subhra Dutta
Rockerbox Data Leak - 245,949 User Records Exposed Including SSNs and Driver’s Licenses
By Tushar Subhra Dutta
Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands
By Tushar Subhra Dutta
Arkana Ransomware Claimed to Have Stolen 2.2 Million Customer Records
By Tushar Subhra Dutta
Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors
By Tushar Subhra Dutta
Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security
By Tushar Subhra Dutta
Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
By Tushar Subhra Dutta
IT Giant Ingram Micro Restores Operations Following Ransomware Attack
By Tushar Subhra Dutta
Critical WordPress Plugin Vulnerability Exposes 200k Websites to Site Takeover Attack
By Tushar Subhra Dutta
Rhadamanthys Infostealer Leveraging ClickFix Technique to Steal Login Credentials
By Tushar Subhra Dutta
New Opossum Attack Allows Hackers to Compromise Secure TLS Channels with Malicious Messages
By Guru Baran
SafePay Ransomware Leverages RDP and VPN for Intruding Into Organizations Network
By Tushar Subhra Dutta
New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App
By Tushar Subhra Dutta
US Sanction Key Threat Actors Linked With North Korea's Remote IT Worker Scheme
By Tushar Subhra Dutta
Hackers Stolen $500,000 in Crypto Assets by Weaponizing AI Extension
By Tushar Subhra Dutta