Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
HIGHMalicious Laravel Packages on Packagist Deploy Cross-Platform RAT
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
HIGHSilver Dragon APT41 Group Exploits Cobalt Strike and Google Drive for Cyber Attacks
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
HIGHCISA Flags Actively Exploited VMware Aria Operations Vulnerability
Paint maker giant AkzoNobel confirms cyberattack on U.S. site
HIGHAkzoNobel Confirms Cyberattack on U.S. Operations
Signed malware impersonating workplace apps deploys RMM backdoors
HIGHSigned Malware Uses Stolen EV Certificate to Deploy RMM Backdoors
Microsoft: Hackers abuse OAuth error flows to spread malware
HIGHHackers Exploit OAuth Error Flows to Spread Malware, Microsoft Warns
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
HIGHFake IT Support Scam Deploys Havoc C2 Framework for Cyber Attacks
Compromised Site Management Panels are a Hot Item in Cybercrime Markets
HIGHUnderground Markets Thrive on Compromised cPanel Credentials
LexisNexis confirms data breach as hackers leak stolen files
HIGHLexisNexis Data Breach Exposes Customer Information
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
HIGHAI-Driven Attacks Exploit FortiGate Appliances in 55 Countries
Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
HIGHStarkiller Phishing Suite Evades MFA with Advanced Proxy Tactics
Amazon: Drone strikes damaged AWS data centers in Middle East
HIGHDrone Strikes Disrupt AWS Data Centers in the Middle East
Showing 181-192 of 373 articles