Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
HIGHSophisticated Cryptojacking Campaign Exploits BYOVD and Logic Bomb Tactics
Ad tech firm Optimizely confirms data breach after vishing attack
HIGHOptimizely Falls Victim to Data Breach via Vishing Attack
Texas AG Sues Shein Over Alleged Deceptive Practices and Data Privacy Risks
Texas AG Targets Shein for Alleged Deceptive Practices and Data Privacy Concerns
When identity isn’t the weak link, access still is
HIGHStrengthening Zero Trust: Beyond Identity Verification
⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More
HIGHWeekly Security Recap: Emerging Threats from Skimmers to AI and DDoS Attacks
CRITICAL: Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
CRITActive Supply Chain Attack Targets npm with Malicious Packages
How Exposed Endpoints Increase Risk Across LLM Infrastructure
HIGHExposed Endpoints: A Growing Risk in LLM Infrastructure
CRITICAL: CISA: Recently patched RoundCube flaws now exploited in attacks
CRITCISA Urges Immediate Patching of Exploited Roundcube Vulnerabilities
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
HIGHMuddyWater Launches New Cyber Campaign in MENA Region
Arkanix Stealer pops up as short-lived AI info-stealer experiment
Arkanix Stealer: AI-Driven Malware Emerges Briefly in Cybercrime Scene
CRITICAL: Predator spyware hooks iOS SpringBoard to hide mic, camera activity
CRITPredator Spyware Cloaks iOS Surveillance Activities
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
HIGHAI-Assisted Threat Actor Targets 600+ FortiGate Devices Globally
Showing 445-456 of 679 articles