Russian-backed hacking group Midnight Blizzard (also known as APT29 or Cozy Bear) is behind a spear-phishing campaign targeting European diplomatic [...]
The Tycoon2FA phishing-as-a-service platform has received updates that enhance its ability to evade detection while targeting Microsoft 365 and Gmail [...]
Hackers began taking advantage of a serious authentication bypass vulnerability in the OttoKit (formerly SureTriggers) WordPress plugin just hours after [...]
Microsoft has acknowledged that the April 2025 cumulative update (KB5055523) may cause Windows Hello to malfunction on certain devices, particularly [...]
Cybercriminals are increasingly abusing WordPress's mu-plugins (Must-Use Plugins) directory to stealthily execute harmful code on every page without being easily [...]
A new ransomware operation, VanHelsing, has surfaced as a multi-platform RaaS (Ransomware-as-a-Service), attacking Windows, Linux, BSD, ARM, and ESXi systems. [...]
Cybercriminals are misusing Microsoft’s Trusted Signing service to code-sign malware using short-lived three-day certificates, making malicious files appear legitimate. Code-signing [...]
Cybercriminals have begun attacking unpatched Cisco Smart Licensing Utility (CSLU) instances by exploiting a vulnerability that provides access to a [...]
Since 2016, the DollyWay malware campaign has compromised over 20,000 WordPress sites worldwide, redirecting visitors to fraudulent pages promoting scams [...]
Facebook has disclosed a critical FreeType vulnerability (CVE-2025-27363) that can enable arbitrary code execution and has reportedly been exploited in [...]
Cybercriminals are falsely claiming copyright ownership of Windows Packet Divert (WPD) tools to pressure YouTube creators into spreading malware and [...]
Microsoft is experimenting with ad-supported versions of its Office desktop apps, allowing users to edit documents with restricted functionality. Unlike [...]
The Chinese APT group "Mustang Panda," also known as Earth Preta, has been abusing Microsoft's Application Virtualization Injector (MAVInject.exe) to [...]
Google Chrome has upgraded its "Enhanced Protection" feature with AI to provide real-time security against malicious websites, downloads, and extensions. [...]
Security researchers from Rapid7 revealed that attackers used a previously unknown PostgreSQL vulnerability (CVE-2025-1094) as a zero-day to exploit BeyondTrust’s [...]
Security researchers at DataDog uncovered a vulnerability called "whoAMI," which lets attackers gain code execution in AWS accounts by publishing [...]
Hackers are increasingly targeting unpatched systems vulnerable to older security flaws, specifically CVE-2022-47945 in ThinkPHP and CVE-2023-49103 in ownCloud. The [...]