A new campaign has been discovered where malicious actors are leveraging AI to craft fake GitHub repositories. They are used…
The CVE-2025-27607 vulnerability was discovered in Python JSON Logger. Its exploitation required no user interaction beyond a standard dependency installation.…
Broadcom has published a report on the discovery of three critical vulnerabilities in their recently acquired VMWare ESXi product lineup.…
Attackers use AI-generated videos featuring credible crypto experts to create YouTube videos promoting trading scam and the deployment of smart…
A new fraudulent campaign to hijack Signal accounts has been detected. Attackers trick victims into scanning a QR code, authorizing…
In the latest update release, Ivanti disclosed the selection of…
The hacker, known as Nam3L3ss, posted the data of over…
On November 11, 2024 a hacker known as Gatito_FBI_NZ published…
While browsing the Web, you can occasionally get to a…
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued an…
Voice-based scams grow increasingly sophisticated with the integration of advanced…
While browsing the Web, you can at some point find…
Scammers use the speed and simplicity of QR code interactions,…
On November 4, 2024 an infamous threat actor that goes…
Cyber attackers leverage copyright infringement claims to lure victims into…
Researchers have demonstrated an exploit targeting the speculative execution vulnerability…
On October 28, 2024 Dutch cyber police launched a website…