WordPress Ad-Fraud Plugins and the Scallywag Operation
Cybersecurity researchers have found a large-scale ad fraud scheme called "Scallywag". It…
MITRE Warns CVE Program Funding Expires on April 16
MITRE, a key player in cybersecurity awareness, has issued a warning about…
D0glun Ransomware: Analysis and Protection Guide
D0glun Ransomware: Technical Analysis and Protection Guide D0glun ransomware emerged in January…
CVE-2025-32395 Vite Vulnerability Exposes Sensitive Files
A newly discovered Vite vulnerability, a widely used frontend development tool, has…
Google Releases Two Android Zero-Day Fixes, Exploited in the Wild
Google addressed two critical Android zero-day vulnerabilities in Android, identified as CVE-2024-53150…
GorillaBot: Advanced Mirai Variant Targeting IoT Devices with Enhanced DDoS Capabilities
GorillaBot is a sophisticated botnet malware that has been making headlines for…
CrushFTP’s Unauthenticated Access Flaw Discovered
CrushFTP has warned users to patch an unauthenticated access flaw immediately, affecting…
Jaguar Land Rover Data Breach Involved Two Attacks
Jaguar Land Rover suffered a significant data breach. Two hackers are said…
Threat Actor Behind X DDoS Attack Revealed
The X DDoS Attack, reported on March 10, 2025, caused significant outages,…
VMWare ESXi Vulnerabilities Exploited, Patch Now
Broadcom has published a report on the discovery of three critical vulnerabilities…
Fox Ransomware
Fox Ransomware is believed to be a variant of the Dharma family,…
Phishing Links in Browser
Phishing links may lurk wherever you go on the Internet: in your…