RSS

Apple iOS 18.1 Beta previews Apple Intelligence for the...

Apple has released the iOS 18.1 Beta to developers, allowing them to test some o...

New Specula tool uses Outlook for remote code execution...

Microsoft Outlook can be turned into a C2 beacon to remotely execute code, as de...

Android spyware 'Mandrake' hidden in apps on Google Pla...

A new version of the Android spyware 'Mandrake' has been found in five applicati...

'Stargazer Goblin' Creates 3,000 Fake GitHub Accounts f...

A threat actor known as Stargazer Goblin has set up a network of inauthentic Git...

How Searchable Encryption Changes the Data Security Game

Searchable Encryption has long been a mystery. An oxymoron. An unattainable drea...

Proofpoint Email Routing Flaw Exploited to Send Million...

An unknown threat actor has been linked to a massive scam campaign that exploite...

Gh0st RAT Trojan Targets Chinese Windows Users via Fake...

The remote access trojan known as Gh0st RAT has been observed being delivered by...

French Govt Investigating Recent Malware Attack that Co...

The French government has investigated a malware attack that compromised approxi...

Cisco Patches the Products Impacted by RADIUS Protocol ...

Cisco has issued patches for multiple products affected by a critical vulnerabil...

North Korean Onyx Sleet Using Group Of Malware And Expl...

Onyx Sleet, a cyber espionage group also known as SILENT CHOLLIMA, Andariel, Dar...

Hackers Attacking Users Searching For W2 Form

A malicious campaign emerged on June 21, 2024, distributing a JavaScript file ho...

PKfail, Critical Firmware Supply-Chain Issue Let Attack...

Hackers often attack secure boot during the boot process to execute unauthorized...

Malicious Python Package Attacking macOS Developers To ...

Hackers continuously exploit malicious Python packages to attack developer envir...

RaspAP Flaw Let Hackers Escalate Privileges with Raspbe...

A critical local privilege escalation vulnerability has been discovered in RaspA...

Ukraine Hacked Russian Banks, Leading Major Disruption

A large-scale cyberattack orchestrated by Ukrainian intelligence led to disrupti...

Threat Actots Leveraging ChatGPT To Craft Sophisticated...

Adversaries are employing Large Language Models to generate malicious code, deli...