CISA recently updated its Known Exploited Vulnerabilities catalog, adding five vulnerabilities that are actively being exploited. These affect Advantive VeraCore,…
A new campaign has been discovered where malicious actors are leveraging AI to craft fake GitHub repositories. They are used…
The CVE-2025-27607 vulnerability was discovered in Python JSON Logger. Its exploitation required no user interaction beyond a standard dependency installation.…
Broadcom has published a report on the discovery of three critical vulnerabilities in their recently acquired VMWare ESXi product lineup.…
Attackers use AI-generated videos featuring credible crypto experts to create YouTube videos promoting trading scam and the deployment of smart…
Cybersecurity researchers have reported the creation of a first-of-its-kind UEFI…
Hackers found a new way of bypassing the email security…
The US cybersecurity agency CISA warned about the ongoing exploitation…
Meta has intensified its fight against pig butchering scams, removing…
Researchers have identified an updated version of NodeStealer, now rewritten…
Attackers are targeting users of Meta services with phishing attacks.…
GitLab has released another update that fixes varying degrees of…
After a brief decline in loader-based malvertising, the FakeBat loader…
In the latest update release, Ivanti disclosed the selection of…
The hacker, known as Nam3L3ss, posted the data of over…
On November 11, 2024 a hacker known as Gatito_FBI_NZ published…
While browsing the Web, you can occasionally get to a…