Threat Actor Behind X DDoS Attack Revealed
The X DDoS Attack, reported on March 10, 2025, caused significant outages,…
CISA Adds 5 Exploited Vulnerabilities, Patch ASAP
CISA recently updated its Known Exploited Vulnerabilities catalog, adding five vulnerabilities that…
SmartLoader, LummaStealer Abuse Fake GitHub Repositories
A new campaign has been discovered where malicious actors are leveraging AI…
Microsoft Account Locked
The "Microsoft Account Locked" scam is a deceptive tech support fraud. Users…
Avoid Getting Locked Out Phishing Email
Avoid Getting Locked Out email scam is a phishing attack designed to…
Python JSON Logger Vulnerability Exposes Millions of Users
The CVE-2025-27607 vulnerability was discovered in Python JSON Logger. Its exploitation required…
TrojanProxy:Win32/Acapaladat.B
TrojanProxy:Win32/Acapaladat.B is a type of malware that hides in free, unauthorized VPN…
OneStart Browser
OneStart is a rogue program that is presented as a Chromium-based browser…
SpaceX Rocket Launch Scam
SpaceX Rocket Launch scam is a series of recurring malignant campaigns that…
VMWare ESXi Vulnerabilities Exploited, Patch Now
Broadcom has published a report on the discovery of three critical vulnerabilities…
Fox Ransomware
Fox Ransomware is believed to be a variant of the Dharma family,…
Phishing Links in Browser
Phishing links may lurk wherever you go on the Internet: in your…