Blogs

March 14, 2026

14,000 routers are infected by malware that’s highly resistant to takedowns

Read More
March 13, 2026

Telus Digital confirms breach after hacker claims 1 petabyte data theft

Read More
March 13, 2026

Microsoft releases Windows 10 KB5078885 extended security update

Read More
March 13, 2026

APT28 hackers deploy customized variant of Covenant open-source tool

Read More
March 13, 2026

Microsoft to enable Windows hotpatch security updates by default

Read More
March 10, 2026

Microsoft releases new Defender update for Windows 11, 10, Server ISO installations

Read More
March 10, 2026

Paint maker giant AkzoNobel confirms cyberattack on U.S. site

Read More
March 10, 2026

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Read More
March 10, 2026

CISA warns that RESURGE malware can be dormant on Ivanti devices

Read More
March 10, 2026

QuickLens Chrome extension steals crypto, shows ClickFix attack

Read More
March 10, 2026

Ransomware payment rate drops to record low as attacks surge

Read More
March 10, 2026

APT37 hackers use new malware to breach air-gapped networks

Read More
March 9, 2026

Microsoft Warns Developers of Fake Next.js Job Repos Delivering In-Memory Malware

Read More
March 9, 2026

Marquis sues SonicWall over backup breach that led to ransomware attack

Read More
March 9, 2026

Critical Cisco SD-WAN 0-Day Vulnerability Exploited Since 2023 to Gain Root Access

Read More
March 9, 2026

Hacker Jailbreaks Claude AI to Write Exploit Code and Steal Government Data

Read More
March 6, 2026

Hackers Leverage DeepSeek and Claude to Attack FortiGate Devices Worldwide

Read More
March 6, 2026

65% of Financial Organizations Targeted by Ransomware as Cybercriminals Escalate Attacks

Read More
March 6, 2026

Threat Actors Allegedly Selling WhatsApp Crash Exploit on Hacking Forums

Read More
March 6, 2026

Microsoft MFA Down – 504 Gateway Timeout Errors Disrupting MFA Access for U.S. Users

Read More
March 6, 2026

Splunk Enterprise for Windows Vulnerability Let Attackers Hijack DLLs and Gain SYSTEM Access

Read More
March 6, 2026

PoC Released for Windows Notepad Vulnerability that Enables Malicious Command Execution

Read More
March 6, 2026

Google Issues Emergency Chrome Security Update to Address High-Severity PDFium and V8 Flaws

Read More
February 28, 2026

Fake CAPTCHA (ClickFix) Attack Chain Leads to Enterprise‑Wide Malware Infection in Organisations

Read More
February 19, 2026

New ClickFix attack abuses nslookup to retrieve PowerShell payload via DNS

Read More
February 19, 2026

Chrome 0-Day Vulnerability Actively Exploited by Attackers in the Wild

Read More
February 19, 2026

CISA flags critical Microsoft SCCM flaw as exploited in attacks

Read More
February 19, 2026

CISA Warns of Notepad++ Code Execution Vulnerability Exploited in Attacks

Read More
February 19, 2026

Fake AI Chrome extensions with 300K users steal credentials, emails

Read More
February 19, 2026

Apple 0-Day Vulnerability Actively Exploited in Sophisticated Attack to Target Individuals

Read More
February 19, 2026

Windows Shell Security Feature 0-Day Vulnerability Let Attackers Bypass Authentication

Read More
February 12, 2026

Windows Remote Access Connection Manager 0-Day Vulnerability Let Attackers Trigger DoS Attack

Read More
February 12, 2026

Windows Remote Desktop Services 0-Day Vulnerability Exploited in the Wild to Escalate Privileges

Read More
February 12, 2026

Microsoft Office Word 0-day Vulnerability Actively Exploited in the Wild

Read More
February 12, 2026

Microsoft Teams New Option Enables Users to Flag Malicious Messages

Read More
February 12, 2026

Fancy Bear Hackers Exploiting Microsoft Zero-Day Vulnerability to Deploy Backdoors and Email Stealers

Read More
February 12, 2026

Microsoft Patch Tuesday February 2026 – 54 Vulnerabilities Fixed, Including 6 Zero-days

Read More
February 12, 2026

Cybersecurity Weekly Newsletter – Notepad++ hack, Office 0-Day, ESXi 0-day Ransomware Attacks and More

Read More
February 12, 2026

CISA Warns of Critical SmarterMail RCE Flaw Actively Exploited in Ransomware Attacks

Read More
February 7, 2026

F5 Patches Critical Vulnerabilities in BIG-IP, NGINX, and Related Products

Read More
February 7, 2026

Betterment Data Breach Exposes 1.4 million Customers Personal Details

Read More
February 7, 2026

Hackers Exploit SonicWall SSLVPN Credentials to Deploy EDR Killer and Bypass Security

Read More
February 7, 2026

Hackers compromise NGINX servers to redirect user traffic

Read More
February 7, 2026

Hackers exploit critical React Native Metro bug to breach dev systems

Read More
February 7, 2026

Hackers Exploiting Microsoft Office 0-day Vulnerability to Deploy Malware

Read More
February 7, 2026

New Stealthy Fileless Linux Malware ‘ShadowHS’ Emphasizes Automated Propagation

Read More
February 7, 2026

DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data

Read More
February 7, 2026

31.4 Tbps DDoS Attack Via Aisuru Botnet Breaks Internet With New World Record

Read More
February 7, 2026

Beware of Weaponized VS Code Extension Named ClawdBot Agent that Deploys ScreenConnect RAT

Read More
February 7, 2026

Chrome Security Update Patches Background Fetch API Vulnerability

Read More
February 7, 2026

Gemini MCP Tool 0-day Vulnerability Allows Remote Attackers to Execute Arbitrary Code

Read More
February 7, 2026

Critical Vulnerability in VM2 Sandbox Library for Node.js Let Attackers run Untrusted Code

Read More
February 7, 2026

HoneyMyte Hacker Group Updates CoolClient Malware to Deploy Browser Login Data Stealer

Read More
February 7, 2026

Critical OpenSSL Vulnerabilities Allow Remote Attackers to Execute Malicious Code

Read More
February 7, 2026

Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors

Read More
February 7, 2026

New malware service guarantees phishing extensions on Chrome web store

Read More
February 7, 2026

Fortinet blocks exploited FortiCloud SSO zero day until patch is ready

Read More
February 7, 2026

MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules

Read More
February 7, 2026

Hackers Exploit Teams’ Functionality to Steal Credentials Mimicking Microsoft Services

Read More
February 7, 2026

Konni hackers target blockchain engineers with AI-built malware

Read More
February 7, 2026

SmarterMail auth bypass flaw now exploited to hijack admin accounts

Read More
February 7, 2026

Hackers Use ‘rn’ Typo Trick to Impersonate Microsoft and Marriott in New Phishing Attack

Read More
February 7, 2026

Hackers Can Use GenAI to Change Loaded Clean Page Into Malicious within Seconds

Read More
February 6, 2026

Cisco Unified Communications 0-day RCE Vulnerability Exploited in the Wild to Gain Root Access

Read More
February 6, 2026

Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex

Read More
February 6, 2026

New Multi-Stage Windows Malware Disables Microsoft Defender Before Dropping Malicious Payloads

Read More
February 6, 2026

TP-Link Vulnerability Allows Authentication Bypass Via Password Recovery Feature

Read More
February 6, 2026

Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026

Read More
February 6, 2026

WordPress Plugin Vulnerability Exposes 100,000+ Sites to Privilege Escalation Attacks

Read More
February 6, 2026

VoidLink Linux Malware Framework Built with AI Assistance Reaches 88,000 Lines of Code

Read More
February 6, 2026

GitLab warns of high-severity 2FA bypass, denial-of-service flaws

Read More
February 6, 2026

Attackers Abuse Discord to Deliver Clipboard Hijacker That Steals Wallet Addresses on Paste

Read More
February 6, 2026

Apache bRPC Vulnerability Enables Remote Command Injection

Read More
February 6, 2026

Free Converter Apps that Convert your Clean System to Infected in Seconds

Read More
February 6, 2026

Cloudflare Zero-Day Vulnerability Enables Any Host Access Bypassing Protections

Read More
February 6, 2026

New AWS Console Supply Chain Attack Allows Hijack of AWS GitHub Repositories

Read More
February 6, 2026

Cisco 0-Day RCE Secure Email Gateway Vulnerability Exploited in the Wild

Read More
February 6, 2026

Promptware Kill Chain – Five-Step Kill Chain Model for Analyzing Cyberthreats

Read More
February 6, 2026

Go 1.25.6 and 1.24.12 Patch Critical Vulnerabilities Lead to DoS and Memory Exhaustion Risks

Read More
February 6, 2026

Microsoft SQL Server Vulnerability Allows Attackers to Elevate Privileges over a Network

Read More
February 6, 2026

Palo Alto Networks Firewall Vulnerability Allows Attacker to Trigger DoS Attacks

Read More
February 6, 2026

Windows Remote Assistance Vulnerability Allow Attacker to Bypass Security Features

Read More
February 6, 2026

Microsoft Desktop Window Manager 0-Day Vulnerability Exploited in the wild

Read More
February 6, 2026

Critical Node.js Vulnerability Can Cause Server Crashes via async_hooks Stack Overflow

Read More
February 6, 2026

Chrome 144 Released With Fix for 10 Vulnerabilities in V8 JavaScript Engine

Read More
February 6, 2026

Exploit code public for critical FortiSIEM command injection flaw

Read More
February 6, 2026

Critical FortiSIEM Vulnerability Enables Arbitrary Commands Execution via Crafted TCP Packets

Read More
February 6, 2026

Critical FortiSIEM Vulnerability Enables Arbitrary Commands Execution via Crafted TCP Packets

Read More
February 6, 2026

FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests

Read More
February 6, 2026

Node.js Security Release Patches 7 Vulnerabilities Across All Release Lines

Read More
February 6, 2026

Microsoft Patch Tuesday January 2026 – 114 Vulnerabilities Fixed Including 3 Zero-days

Read More
February 6, 2026

Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets

Read More
February 6, 2026

FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code

Read More
February 6, 2026

New GoBruteforcer attack wave targets crypto, blockchain projects

Read More
February 6, 2026

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

Read More
February 6, 2026

Cisco Talos Traces UAT-7290’s Linux Malware Campaign Against Telecom Providers

Read More
February 6, 2026

Trend Micro warns of critical Apex Central RCE vulnerability

Read More
February 6, 2026

Hackers Actively Exploiting AI Deployments – 91,000+ Attack Sessions Observed

Read More
January 24, 2026

New Malware Automatically Send to Contacts via WhatsApp Web Attacks Windows Systems

Read More
January 24, 2026

CISA retires 10 emergency cyber orders in rare bulk closure

Read More
January 22, 2026

Fake Fortinet Sites Steal VPN Credentials in Sophisticated Phishing Attack

Read More
January 22, 2026

New OAuth-Based Attack Let Hackers Bypass Microsoft Entra Authentication Flows to Steal Keys

Read More
January 22, 2026

Three Malicious NPM Packages Attacking Developers to Steal Login Credentials

Read More
January 22, 2026

Forcepoint DLP Vulnerability Enables Memory Manipulation and Arbitrary Code Execution

Read More
January 22, 2026

Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information

Read More
January 22, 2026

ToddyCat Malware Compromises Microsoft Exchange Servers using ProxyLogon Vulnerability

Read More
January 22, 2026

Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication

Read More
January 22, 2026

Black Cat Hacker Group with Fake Notepad++ Sites to Install Malware and Steal Data

Read More
January 22, 2026

n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions

Read More
January 22, 2026

Critical Dolby Codec Vulnerability Exposes Android Devices to Code Execution Attacks

Read More
January 9, 2026

Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users

Read More
January 9, 2026

New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands

Read More
January 9, 2026

Critical GNU Wget2 Vulnerability Let Remote Attackers to Overwrite Sensitive Files

Read More
January 9, 2026

RondoDoX Botnet Weaponizing a Critical React2Shell Vulnerability to Deploy Malware

Read More
January 9, 2026

Threat Actor Exploited Multiple FortiWeb Appliances to Deploy Sliver C2 for Persistent Access

Read More
January 9, 2026

GravityRAT Steals WhatsApp Backups and Uses CPU Temperature to Detect Sandboxes

Read More
January 9, 2026

Scattered Lapsus$ Hunters Resurface with New RaaS Platform ‘ShinySp1d3r’ and Aggressive Insider Recruitment

Read More
January 9, 2026

Threat Actors Hacked Global Companies via Leaked Cloud Credentials from Infostealer Infections

Read More
January 9, 2026

Stealthy Tuoni C2 Malware Targets Major U.S. Real Estate Firm with AI-Enhanced Tactics

Read More
January 9, 2026

Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data

Read More
January 5, 2026

Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network

Read More
January 5, 2026

Infostealers Enable Attackers to Hijack Legitimate Business Infrastructure for Malware Hosting

Read More
January 5, 2026

Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack

Read More
January 5, 2026

IBM warns of critical API Connect auth bypass vulnerability

Read More
January 1, 2026

NeuroSploitv2 – AI-Powered Pentesting Tool With Claude, GPT, and Gemini models to Detect vulnerabilities

Read More
January 1, 2026

New Spear-Phishing Attack Targeting Security Individuals in Israel Region

Read More
January 1, 2026

RondoDox botnet exploits React2Shell flaw to breach Next.js servers

Read More
January 1, 2026

Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures

Read More
January 1, 2026

Hackers Exploit Copilot Studio’s New Connected Agents Feature to Gain Backdoor Access

Read More
January 1, 2026

Critical 0-Day RCE Vulnerability in Networking Devices Exposes 70,000+ Hosts

Read More
December 31, 2025

Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks

Read More
December 30, 2025

Windows Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation

Read More
December 30, 2025

MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847)

Read More
December 30, 2025

Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach

Read More
December 30, 2025

Hacker claims to leak WIRED database with 2.3 million records

Read More
December 30, 2025

Exploited MongoBleed flaw leaks MongoDB secrets, 87K servers exposed

Read More
December 30, 2025

87,000+ MongoDB Instances Vulnerable to MongoBleed Flaw Exposed Online – PoC Exploit Released

Read More
December 30, 2025

New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

Read More
December 30, 2025

TeamViewer DEX Vulnerabilities Let Attackers Trigger DoS Attack and Expose Sensitive Data

Read More
December 30, 2025

Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data

Read More
December 30, 2025

China-Linked ‘Evasive Panda’ Poisoned DNS to Hack Users in India, Türkiye and China

Read More
December 30, 2025

Hackers Exploiting Three-Year-Old FortiGate Vulnerability to Bypass 2FA on Firewalls

Read More
December 30, 2025

Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass

Read More
December 30, 2025

Net-SNMP Vulnerability Enables Buffer Overflow and the Daemon to Crash

Read More
December 30, 2025

100+ Cybersecurity Predictions 2026 for Industry Experts as the AI Adapted in the Wild

Read More
December 30, 2025

Google Now Allows Users to Change Their @gmail.com Email Address

Read More
December 26, 2025

Operation PCPcat Hacked 59,000+ Next.js/React Servers Within 48 Hours

Read More
December 26, 2025

PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution

Read More
December 26, 2025

PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation

Read More
December 26, 2025

Romanian water authority hit by ransomware attack over weekend

Read More
December 26, 2025

WebRAT malware spread via fake vulnerability exploits on GitHub

Read More
December 26, 2025

Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges

Read More
December 26, 2025

CISA Adds ASUS Embedded Malicious Code Vulnerability to KEV List Following Active Exploitation

Read More
December 26, 2025

New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector

Read More
December 26, 2025

Critical Apache Commons Text Vulnerability Enables Remote Code Execution Attacks

Read More
December 26, 2025

WatchGuard 0-day Vulnerability Exploited in the Wild to Hijack Firewalls

Read More
December 26, 2025

Critical Vulnerability in Popular Node.js Library Exposes Windows Systems to RCE Attacks

Read More
December 26, 2025

Microsoft Confirms Recent Windows 11 24H2/25H2 and Server 2025 Update Breaks RemoteApp Connections

Read More
December 26, 2025

BugTrace – AI-based Penetration Testing Tool to Detect Potential Vulnerabilities

Read More
December 26, 2025

CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation

Read More
December 26, 2025

Chinese Hackers Using Custom ShadowPad IIS Listener Module to Turn Compromised Servers into Active Nodes

Read More
December 26, 2025

Chrome Security Update – Patch for Critical Vulnerabilities that Enables Remote Code Execution

Read More
December 26, 2025

New GhostPairing Attack Let Attackers Gain Full Access in WhatsApp with Phone Number

Read More
December 26, 2025

The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet

Read More
December 26, 2025

Sonicwall warns of new SMA1000 zero-day exploited in attacks

Read More
December 26, 2025

LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS

Read More
December 26, 2025

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Read More
December 26, 2025

Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild

Read More
December 23, 2025

Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host

Read More
December 23, 2025

Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges

Read More
December 23, 2025

Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users

Read More
December 23, 2025

New JSCEAL Infostealer Malware Attacking Windows Systems to Steal Login Credentials

Read More
December 23, 2025

Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)

Read More
December 23, 2025

MITRE shares 2025's top 25 most dangerous software weaknesses

Read More
December 23, 2025

Windows Defender Firewall Service Vulnerability Let Attackers Disclose Sensitive Data

Read More
December 23, 2025

Notepad++ Vulnerability Let Attackers Hijack Network Traffic to Install Malware via Updates

Read More
December 23, 2025

Hackers Infiltrate VS Code Marketplace with 19 Malicious Extensions Posing as PNG File

Read More
December 23, 2025

Adobe Acrobat Reader Vulnerabilities Let Attackers Execute Arbitrary Code and Bypass Security

Read More
December 23, 2025

FortiSandbox OS command injection Vulnerability Let Attackers execute Malicious code

Read More
December 23, 2025

Gemini Zero-Click Vulnerability Let Attackers Access Gmail, Calendar, and Docs

Read More
December 23, 2025

Windows PowerShell 0-Day Vulnerability Let Attackers Execute Malicious Code

Read More
December 23, 2025

Microsoft Outlook Vulnerability Let Attackers Execute Malicious Code Remotely

Read More
December 23, 2025

FortiOS, FortiWeb, and FortiProxy Vulnerability Lets Attackers Bypass FortiCloud SSO Authentication

Read More
December 23, 2025

Ransomware Targeting Hyper-V and VMware ESXi Surges as Akira Group Exploits System Vulnerabilities

Read More
December 20, 2025

Microsoft December 2025 Patch Tuesday – 56 Vulnerabilities Fixed Including 3 Zero-days

Read More
December 20, 2025

Burp Suite’s Scanning Arsenal Powered With Detection for Critical React2Shell Vulnerabilities

Read More
December 20, 2025

Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Read More
December 20, 2025

Next.js Released a Scanner to Detect and Update Apps Impacted by React2Shell Vulnerability

Read More
December 20, 2025

NETREAPER Offensive Security Toolkit That Wraps 70+ Penetration Testing Tools

Read More
December 20, 2025

Researchers Uncovered AWS IAM Eventual Consistency to Establish Persistence

Read More
December 20, 2025

Portugal updates cybercrime law to exempt security researchers

Read More
December 20, 2025

Avast Antivirus Sandbox Vulnerabilities Let Attackers Escalate Privileges

Read More
December 20, 2025

Cybersecurity News Weekly Newsletter – 29.7 Tbps DDoS Attack, Chrome 143, React2Shell Vulnerabilities, and Cloudflare Outage

Read More
December 20, 2025

KimJongRAT Attacking Windows Users via Weaponized .hta Files to Steal Logins

Read More
December 20, 2025

China-Nexus Hackers Actively Exploiting React2Shell Vulnerability (CVE-2025-55182) in the Wild

Read More
December 20, 2025

New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)

Read More
December 20, 2025

Lazarus Group’s IT Workers Scheme Hacker Group Caught Live On Camera

Read More
December 18, 2025

Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack

Read More
December 18, 2025

Chrome 143 Released With Fix for 13 Vulnerabilities that Enable Arbitrary Code Execution

Read More
December 18, 2025

Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack

Read More
December 18, 2025

CISA Warns of Android 0-Day Vulnerability Exploited in Attacks

Read More
December 18, 2025

Multiple Django Vulnerabilities Enables SQL Injection and Denial-of-Service Attacks

Read More
December 18, 2025

Charging Cable that Hacks your Device to Record Keystrokes and Control Wi-Fi

Read More
December 18, 2025

Dead Man’s Switch – Widespread npm Supply Chain Attack Driving Malware Attacks

Read More
December 18, 2025

Critical Apache bRPC Framework Vulnerability Let Attackers Crash the Server

Read More
December 18, 2025

Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data

Read More
December 18, 2025

4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign

Read More
December 18, 2025

New Albiriox Malware Attacking Android Users to Take Complete Control of their Device

Read More
December 18, 2025

ASUS MyASUS Flaw Lets Hackers Escalate to SYSTEM-Level Access

Read More
December 18, 2025

Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets

Read More
December 18, 2025

Hackers Exploit NTLM Authentication Flaws to Target Windows Systems

Read More
December 12, 2025

HashJack: New Attack Technique Tricks AI Browsers Using a Simple ‘#’

Read More
December 12, 2025

New EtherHiding Attack Uses Web-Based Attacks to Deliver Malware and Rotate Payloads

Read More
December 12, 2025

Cybersecurity News Weekly Newsletter – Fortinet, Chrome 0-Day Flaws, Cloudflare Outage and Salesforce Gainsight Breach

Read More
December 12, 2025

Water Gamayun Hackers Exploit Windows MSC EvilTwin 0-Day to Inject Stealthy Malware

Read More
December 3, 2025

New Unauthenticated DoS Vulnerability Crashes Next.js Servers with a Single Request

Read More
December 3, 2025

OpenAI discloses API customer data breach via Mixpanel vendor hack

Read More
December 3, 2025

Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack

Read More
December 3, 2025

HashiCorp Vault Vulnerability Allow Attackers to Authenticate to Vault Without Valid Credentials

Read More
December 3, 2025

Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack

Read More
December 3, 2025

KawaiiGPT – New Black-Hat AI Tool Used by Hackers to Launch Cyberattacks

Read More
December 3, 2025

Microsoft’s Update Health Tools Configuration Vulnerability Let Attackers Execute Arbitrary Code Remotely

Read More
December 3, 2025

PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks

Read More
December 3, 2025

APT35 Hacker Groups Internal Documents Leak Exposes their Targets and Attack Methods

Read More
December 3, 2025

Hackers Replace ‘m’ with ‘rn’ in Microsoft(.)com to Steal Users’ Login Credentials

Read More
December 3, 2025

Wireshark Vulnerabilities Let Attackers Crash by Injecting a Malformed Packet

Read More
December 3, 2025

CISA Warns of Oracle’s Identity Manager RCE Vulnerability Actively Exploited in Attacks

Read More
November 28, 2025

Cl0p Ransomware Strikes Globally: Cox Enterprises Hit — 9,479 Users’ Data Exposed via Oracle EBS Zero-Day

Read More
November 25, 2025

Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update

Read More
November 25, 2025

Microsoft Confirms Windows 11 24H2 Update Broken Multiple Core Features

Read More
November 25, 2025

Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges

Read More
November 25, 2025

Grafana warns of max severity admin spoofing vulnerability

Read More
November 24, 2025

Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks

Read More
November 24, 2025

Broadcom Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack

Read More
November 23, 2025

SonicOS SSLVPN Vulnerability Let Attackers Crash the Firewall Remotely

Read More
November 23, 2025

Oracle Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack

Read More
November 22, 2025

Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums

Read More
November 22, 2025

Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image

Read More
November 21, 2025

UNC1549 Hackers with Custom Tools Attacking Aerospace and Defense Systems to Steal Logins

Read More
November 21, 2025

Hackers Actively Exploiting 7-Zip RCE Vulnerability in the Wild

Read More
November 20, 2025

Microsoft: Azure hit by 15 Tbps DDoS attack using 500,000 IP addresses

Read More
November 20, 2025

W3 Total Cache Command Injection Vulnerability Exposes 1 Million WordPress Sites to RCE Attacks

Read More
November 19, 2025

IBM AIX Vulnerabilities Let Remote Attacker Execute Arbitrary Commands

Read More
November 19, 2025

Chrome Type Confusion Zero-Day Vulnerability Actively Exploited in the Wild

Read More
November 19, 2025

Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware

Read More
November 18, 2025

Critical RCE Vulnerabilities in AI Inference Engines Exposes Meta, Nvidia and Microsoft Frameworks

Read More
November 17, 2025

CISA Warns of Fortinet FortiWeb WAF Vulnerability Exploited in the Wild to Gain Admin Access

Read More
November 17, 2025

TaskHound Tool – Detects Windows Scheduled Tasks Running with Elevated Privileges and Stored Credentials

Read More
November 16, 2025

Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges

Read More
November 16, 2025

PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild

Read More
November 15, 2025

Hackers Weaponizing Calendar Files as New Attack Vector Bypassing Traditional Email Defenses

Read More
November 15, 2025

ChatGPT Hacked Using Custom GPTs Exploiting SSRF Vulnerability to Expose Secrets

Read More
November 14, 2025

Windows Remote Desktop Services Vulnerability Let Attackers Escalate Privileges

Read More
November 14, 2025

Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk

Read More
November 13, 2025

Windows Kernel 0‑day Vulnerability Actively Exploited in the Wild to Escalate Privilege

Read More
November 13, 2025

CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks

Read More
November 12, 2025

Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses

Read More
November 12, 2025

MAD-CAT Meow Attack Tool to Simulate Real-World Data Corruption Attacks

Read More
November 11, 2025

Critical Vulnerability in Popular NPM Library Exposes AI and NLP Apps to Remote Code Execution

Read More
November 11, 2025

Elastic Defend for Windows Vulnerability Let Attackers Escalate Privileges

Read More
November 10, 2025

HackGPT: AI-Powered Penetration Testing Platform Includes GPT-4 and Other AI Engines

Read More
November 10, 2025

Cybersecurity News Weekly Newsletter – Android and Cisco 0-Day, Teams Flaws, HackedGPT, and Whisper Leak

Read More
November 10, 2025

Hackers Can Attack Active Directory Sites to Escalate Privileges and Domain Compromise

Read More
November 8, 2025

Microsoft Entra Credentials in the Authenticator App on Jail-Broken Devices to be Wiped Out

Read More
November 8, 2025

Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks

Read More
November 8, 2025

Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files

Read More
November 8, 2025

HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface

Read More
November 8, 2025

List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities

Read More
November 7, 2025

Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution

Read More
November 7, 2025

Cisco Warns of Hackers Actively Exploiting ASA and FTD 0-day RCE Vulnerability in the Wild

Read More
November 7, 2025

Windows Cloud Files Mini Filter Driver Vulnerability Exploited to Escalate Privileges

Read More
November 7, 2025

Clop Ransomware Actors Exploiting the Latest 0-Day Exploits in the Wild

Read More
November 7, 2025

Attack Techniques of Tycoon 2FA Phishing Kit Targeting Microsoft 365 and Gmail Accounts Detailed

Read More
November 7, 2025

Microsoft Warns Windows Systems May Enter BitLocker Recovery After October 2025 Updates

Read More
November 6, 2025

Hackers Exploit OneDrive.exe Through DLL Sideloading to Execute Arbitrary Code

Read More
November 6, 2025

Microsoft Warns Windows Systems May Enter BitLocker Recovery After October 2025 Updates

Read More
November 6, 2025

Weaponized Putty and Teams Ads Deliver Malware Allowing Hackers to Access Network

Read More
November 6, 2025

Critical RCE Vulnerability in Popular React Native NPM Package Exposes Developers to Attacks

Read More
November 5, 2025

Hackers Actively Scanning for TCP Port 8530/8531 Linked to WSUS Vulnerability CVE-2025-59287

Read More
November 5, 2025

Critical Android 0-Click Vulnerability in System Component Allows Remote Code Execution Attacks

Read More
November 5, 2025

Hackers Can Exploit Microsoft Teams Vulnerabilities to Manipulate Messages and Alter Notifications

Read More
November 4, 2025

Microsoft Patch for WSUS Vulnerability has Broken Hotpatching on Windows Server 2025

Read More
November 4, 2025

Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data

Read More
November 4, 2025

Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code

Read More
November 3, 2025

Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar ChatGPT Agent

Read More
November 3, 2025

New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files

Read More
November 3, 2025

CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware

Read More
November 3, 2025

CISA: High-severity Linux flaw now exploited by ransomware gangs

Read More
October 30, 2025

New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding

Read More
October 30, 2025

Ubuntu’s Kernel Vulnerability Let Attackers Escalate Privileges and Gain Root Access

Read More
October 30, 2025

Cybersecurity Newsletter Weekly – AWS Outage, WSUS Exploitation, Chrome Flaws, and RDP Attacks

Read More
October 29, 2025

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver

Read More
October 29, 2025

Apache Tomcat Security Vulnerabilities Expose Servers to Remote Code Execution Attacks

Read More
October 28, 2025

Chrome 0-Day Vulnerability Actively Exploited in Attacks by Notorious Hacker Group

Read More
October 28, 2025

Critical Dell Storage Manager Vulnerabilities Let Attackers Compromise System

Read More
October 28, 2025

Infamous Cybercriminal Forum BreachForums Is Back Again With a New Clear Net Domain

Read More
October 27, 2025

Hackers Exploiting Microsoft WSUS Vulnerability In The Wild – 2800 Instances Exposed Online

Read More
October 27, 2025

131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store

Read More
October 27, 2025

New PDF Tool to Detect Malicious PDF Using PDF Object Hashing Technique

Read More
October 26, 2025

Hackers Abuse Microsoft 365 Exchange Direct Send to Bypass Content Filters and Harvest Sensitive Data

Read More
October 26, 2025

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild

Read More
October 25, 2025

Hackers Abuse ASP.NET Machine Keys to Compromise IIS Servers and Deploy Malicious Modules

Read More
October 25, 2025

Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability

Read More
October 24, 2025

Hackers Can Access Microsoft Teams Chat and Emails by Retrieving Access Tokens

Read More
October 24, 2025

Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations

Read More
October 23, 2025

Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset

Read More
October 23, 2025

Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial of Service Attacks

Read More
October 22, 2025

Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams

Read More
October 22, 2025

Critical ASP.NET Vulnerability Allows Attacker To Bypass Security Feature Remotely

Read More
October 22, 2025

Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code

Read More
October 21, 2025

Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data

Read More
October 21, 2025

Hackers Attacking Remote Desktop Protocol Services With 30,000+ New IP Addresses Daily

Read More
October 20, 2025

CISA Warns of Windows SMB Vulnerability Actively Exploited in Attacks

Read More
October 20, 2025

CISA: High-severity Windows SMB flaw now exploited in attacks

Read More
October 19, 2025

New DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders

Read More
October 19, 2025

PoC Exploit Released for Windows Server Update Services Remote Code Execution Vulnerability

Read More
October 18, 2025

PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation

Read More
October 18, 2025

PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution

Read More
October 17, 2025

Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities

Read More
October 17, 2025

Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely

Read More
October 17, 2025

Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code

Read More
October 17, 2025

Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code

Read More
October 17, 2025

Cisco SNMP 0-Day Vulnerability Actively Exploited To Deploy Linux Rootkits

Read More
October 16, 2025

Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code

Read More
October 16, 2025

Windows Remote Access Connection Manager 0-Day Vulnerability Actively Exploited in Attacks

Read More
October 15, 2025

Microsoft October 2025 Patch Tuesday – 4 Zero-days and 172 Vulnerabilities Patched

Read More
October 15, 2025

Hackers Can Bypass OpenAI Guardrails Using a Simple Prompt Injection Technique

Read More
October 15, 2025

FortiOS CLI Command Bypass Vulnerability Let Attacker Execute System Commands

Read More
October 13, 2025

Hackers Actively Compromising Databases Using Legitimate Commands

Read More
October 13, 2025

Microsoft Defender Vulnerabilities Allow Attackers to Bypass Authentication and Upload Malicious Files

Read More
October 13, 2025

APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails

Read More
October 9, 2025

CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks

Read More
October 9, 2025

OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code – PoC Released

Read More
October 9, 2025

Chrome Security Update Patches 21 Vulnerabilities that Allow Attackers to Execute Arbitrary Code

Read More
October 6, 2025

Google Chrome RCE Vulnerability Details Released Along with Exploit Code

Read More
October 6, 2025

Google Chrome RCE Vulnerability Details Released Along with Exploit Code

Read More
October 5, 2025

Hackers Trick Users into Download Weaponized Microsoft Teams to Gain Remote Access

Read More
October 5, 2025

New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems

Read More
October 4, 2025

Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability

Read More
October 4, 2025

Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In The Wild

Read More
October 4, 2025

CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks

Read More
October 4, 2025

OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely

Read More
September 30, 2025

Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code

Read More
September 29, 2025

Hackers use Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

Read More
September 27, 2025

CISA Warns of Cisco Firewall 0-Day Vulnerabilities Actively Exploited in the Wild

Read More
September 27, 2025

Hackers Exploiting WordPress Websites With Silent Malware to Gain Admin Access

Read More
September 27, 2025

Cisco ASA 0-Day RCE Vulnerability Actively Exploited in the Wild

Read More
September 27, 2025

Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information

Read More
September 26, 2025

Hackers Exploit WerFaultSecure.exe Tool to Steal Cached Passwords From LSASS on Windows 11 24H2

Read More
September 26, 2025

Automaker giant Stellantis confirms data breach after Salesforce hack

Read More
September 26, 2025

CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks

Read More
September 26, 2025

Beware of Fake Online Speedtest Application With Obfuscated JS Codes

Read More
September 26, 2025

Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild

Read More
September 25, 2025

Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Read More
September 25, 2025

Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments

Read More
September 25, 2025

Windows 11 24H2 Update KB5064081 Breaks Video Content Playback

Read More
September 22, 2025

Chrome Type Confusion 0-Day Vulnerability Code Analysis Released

Read More
September 18, 2025

Apple Backports Fix for CVE-2025-43300 Exploited in Sophisticated Spyware Attack

Read More
September 18, 2025

How a Plaintext File On Users’ Desktops Exposed Secrets Leads to Akira Ransomware Attacks

Read More
September 18, 2025

Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions

Read More
September 18, 2025

Hackers Using Generative AI ‘ChatGPT’ to Evade Anti-virus Defenses

Read More
September 18, 2025

IBM QRadar SIEM Vulnerability Let Attackers Perform Unauthorized Actions

Read More
September 16, 2025

BitlockMove Tool Enables Lateral Movement via Bitlocker DCOM & COM Hijacking

Read More
September 16, 2025

Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication

Read More
September 16, 2025

EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections

Read More
September 16, 2025

Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data

Read More
September 13, 2025

Samsung patches actively exploited zero-day reported by WhatsApp

Read More
September 13, 2025

Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code

Read More
September 13, 2025

Windows Defender Firewall Vulnerabilities Let Attackers Escalate Privileges

Read More
September 13, 2025

Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers

Read More
September 13, 2025

Elastic Security Incident – Hackers Accessed Email Account Contains Valid Credentials

Read More
September 13, 2025

HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance

Read More
September 13, 2025

PgAdmin Vulnerability Lets Attackers Gain Unauthorised Account Access

Read More
September 13, 2025

Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges

Read More
September 11, 2025

GhostRedirector Hackers Compromise Windows Servers With Malicious IIS Module To Manipulate Search Results

Read More
September 11, 2025

SpamGPT – AI-powered Attack Tool Used By Hackers For Massive Phishing Attack

Read More
September 11, 2025

FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands

Read More
September 11, 2025

Windows BitLocker Vulnerability Let Attackers Elevate Privileges

Read More
September 11, 2025

Chrome Security Update Patches Critical Remote Code Execution Vulnerability

Read More
September 10, 2025

Windows Defender Vulnerability Allows Service Hijacking and Disablement via Symbolic Link Attack

Read More
September 10, 2025

Hackers Hijacked 18 Very Popular npm Packages With 2 Billion Weekly Downloads

Read More
September 10, 2025

How Prompt Injection Attacks Bypassing AI Agents With Users Input

Read More
September 10, 2025

Microsoft Confirms Recent Windows 11 24H2 Security Update Not Causing SSD/HDD Failures

Read More
September 10, 2025

New ClickFix Attack Mimic as AnyDesk Leverages Windows Search to Drop MetaStealer

Read More
September 8, 2025

New ClickFix Attack Mimic as AnyDesk Leverages Windows Search to Drop MetaStealer

Read More
September 8, 2025

New ‘NotDoor’ Malware Attacks Outlook Users to Exfiltrate Data and Compromise Computers

Read More
September 8, 2025

Attackers Are Abusing Malicious PDFs: Here’s How to Spot Them Early

Read More
September 8, 2025

Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers

Read More
September 8, 2025

MobSF Security Testing Tool Vulnerability Let Attackers Upload Malicious Files

Read More
September 7, 2025

Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System

Read More
September 6, 2025

Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode

Read More
September 6, 2025

CISA Warns of Android 0-Day Use-After-Free Vulnerability Exploited in Attacks

Read More
September 6, 2025

New Dire Wolf Ransomware Attack Windows Systems, Deletes Event Logs and Backup-Related Data

Read More
September 6, 2025

Chinese APT Hackers Exploit Router Vulnerabilities to Infiltrate Enterprise Environments

Read More
September 5, 2025

PoC Exploit Released for IIS WebDeploy Remote Code Execution Vulnerability

Read More
September 5, 2025

Weaponized PuTTY Via Bing Ads Exploit Kerberos and Attack Active Directory Services

Read More
September 4, 2025

Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack

Read More
September 4, 2025

Chrome Security Update – Patch for Vulnerabilities that Enable RCE Attacks

Read More
September 3, 2025

PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild

Read More
September 3, 2025

Critical Next.js Framework Vulnerability Let Attackers Bypass Authorization

Read More
September 3, 2025

Azure Active Directory Vulnerability Exposes Credentials and Enables Attackers to Deploy Malicious Apps

Read More
September 2, 2025

PoC Exploit & Vulnerability Analysis Released for Apple 0-Day RCE Vulnerability

Read More
September 2, 2025

Linux UDisks Daemon Vulnerability Allows Attackers Access to Privileged User Files

Read More
September 2, 2025

Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed

Read More
September 1, 2025

New ‘Sindoor Dropper’ Malware Targets Linux Systems with Weaponized .desktop Files

Read More
September 1, 2025

Hackers Abuse Microsoft Teams to Gain Remote Access on Windows With PowerShell-based Malware

Read More
August 29, 2025

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers – Detailed Case Study

Read More
August 29, 2025

0-Day Clickjacking Vulnerabilities Found in Major Password Managers like 1Password, LastPass and Others

Read More
August 28, 2025

PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309)

Read More
August 28, 2025

Weaponized PuTTY Via Bing Ads Exploit Kerberos and Attack Active Directory Services

Read More
August 27, 2025

PoC Exploit Released for Chrome 0-Day Vulnerability Exploited in the Wild

Read More
August 27, 2025

CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks

Read More
August 26, 2025

Critical Apple 0-Day Vulnerability Actively Exploited in the Wild – Update Now

Read More
August 26, 2025

PoC Exploit & Vulnerability Analysis Released for Apple 0-Day RCE Vulnerability

Read More
August 25, 2025

Microsoft Confirms August 2025 Update Causes Severe Lag in Windows 11 24H2, and Windows 10

Read More
August 22, 2025

Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins

Read More
August 22, 2025

Azure’s Default API Connection Vulnerability Enables Full Cross-Tenant Compromise

Read More
August 22, 2025

ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words

Read More
August 21, 2025

Copilot Vulnerability Breaks Audit Logs and Access Files Secretly for Hackers

Read More
August 21, 2025

Chrome High-Severity Vulnerability Let Attackers Execute Arbitrary Code

Read More
August 20, 2025

CVE-2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware

Read More
August 20, 2025

New Exploit for SAP 0-Day Vulnerability Allegedly Released in the Wild by ShinyHunters Hackers

Read More
August 20, 2025

Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption

Read More
August 19, 2025

Linux Kernel Netfilter Vulnerability Let Attackers Escalate Privileges

Read More
August 19, 2025

Critical PostgreSQL Vulnerabilities Allow Arbitrary Code Injection During Restoration

Read More
August 18, 2025

North Korean Hackers Stealthy Linux Malware Leaked Online

Read More
August 17, 2025

New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD

Read More
August 17, 2025

Weekly Cybersecurity News Recap : Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks

Read More
August 11, 2025

GPT-5 Jailbroken With Echo Chamber and Storytelling Attacks

Read More
August 10, 2025

New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Server/Endpoint, Domain Controllers Into DDoS Botnet

Read More
August 8, 2025

Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands

Read More
August 7, 2025

New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data

Read More
August 5, 2025

HTTP/1.1 Fatal Vulnerability Exposes Millions of Websites to Hostile Takeover

Read More
August 4, 2025

Mustang Panda Attacking Windows Users With ToneShell Malware Mimic as Google Chrome

Read More
August 3, 2025

Hackers Can Steal IIS Machine Keys by Exploiting SharePoint Deserialization Vulnerability

Read More
August 2, 2025

Raspberry Robin Malware Attacking Windows Systems With New Exploit for CLFS Driver Vulnerability

Read More
August 1, 2025

Critical Android System Component Vulnerability Allows Remote Code Execution Without User Interaction

Read More
July 31, 2025

WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution

Read More
July 30, 2025

$1,000,000 for WhatsApp 0-Click RCE Exploit at Pwn2Own Ireland 2025

Read More
July 29, 2025

Hackers Attacking IIS Servers With New Web Shell Script to Gain Complete Remote Control

Read More
July 28, 2025

Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets

Read More
July 27, 2025

Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results

Read More
July 26, 2025

Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System

Read More
July 25, 2025

First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology

Read More
July 24, 2025

Threat Actors Attacking Linux SSH Servers to Deploy SVF Botnet

Read More
July 22, 2025

CISA Warns of Microsoft SharePoint Server 0-Day RCE Vulnerability Exploited in Wild

Read More
July 22, 2025

Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code

Read More
July 21, 2025

New 7-Zip Vulnerability Enables Weaponized RAR5 File to Crash Your System

Read More
July 21, 2025

Weak Password Let Ransomware Gang Destroy 158-Year-Old Company

Read More
July 20, 2025

Laravel Security Notice: Livewire v3 Remote Code Execution Vulnerability!

Read More
July 19, 2025

New WAFFLED Attack Exploits AWS, Azure, Cloud Armor, Cloudflare, and ModSecurity WAFs

Read More
July 19, 2025

Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution

Read More
July 18, 2025

Microsoft Entra ID Vulnerability Let Attackers Escalate Privileges to Global Admin Role

Read More
July 18, 2025

Critical Cisco ISE Vulnerability Allows Remote Attacker to Execute Commands as Root User

Read More
July 17, 2025

Fortinet FortiWeb Instances Hacked With Webshells Following Public PoC Exploits

Read More
July 16, 2025

Microsoft Teams Call Weaponized to Deploy and Execute Matanbuchus Ransomware

Read More
July 16, 2025

Google Chrome 0-day Vulnerability Actively Exploited in the Wild

Read More
July 15, 2025

WinRAR 0‑Day Exploit Listed for $80K on Dark Web Forum

Read More
July 15, 2025

Interlock ransomware adopts new FileFix attack to push malware

Read More
July 14, 2025

20-Year-Old Vulnerability Allows Hackers to Control Train Brakes

Read More
July 14, 2025

New eSIM Hack Lets Attackers Clone Profiles and Hijack Phone Identities

Read More
July 13, 2025

New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting Remote Desktop Protocol

Read More
July 13, 2025

Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails

Read More
July 12, 2025

Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability

Read More
July 12, 2025

Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub

Read More
July 11, 2025

Microsoft Patches Wormable RCE Vulnerability in Windows Client and Server

Read More
July 11, 2025

Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code

Read More
July 10, 2025

Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network

Read More
July 10, 2025

Microsoft Remote Desktop Client Vulnerability Let Attackers Execute Remote Code

Read More
July 9, 2025

Windows BitLocker Bypass Vulnerability Let Attackers Bypass Security Feature

Read More
July 9, 2025

BERT Ransomware Forcibly Shut Down ESXi Virtual Machines to Disrupt Recovery

Read More
July 8, 2025

FortiOS Buffer Overflow Vulnerability Allows Attackers to Execute Arbitrary Code

Read More
July 8, 2025

Weaponized Versions of PuTTY and WinSCP Attacking IT Admins Via Search Results

Read More
July 7, 2025

APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data

Read More
July 7, 2025

PoC Released for Linux Privilege Escalation Vulnerability via udisksd and libblockdev

Read More
July 6, 2025

Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365

Read More
July 6, 2025

New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique

Read More
July 5, 2025

Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild

Read More
July 5, 2025

Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware

Read More
July 4, 2025

Critical HIKVISION applyCT Vulnerability Exposes Devices to Code Execution Attacks

Read More
July 4, 2025

CISA Warns of Chrome 0-Day Vulnerability Exploited in Attacks

Read More
July 4, 2025

12-Year-Old Sudo Linux Vulnerability Enables Privilege Escalation to Root User

Read More
July 3, 2025

Threat Actors Exploiting Windows & Linux Servers Vulnerability to Deploy Web Shell

Read More
July 3, 2025

FileFix Attack Exploits Windows Browser Features to Bypass Mark-of-the-Web Protection

Read More
July 3, 2025

Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools

Read More
July 2, 2025

Nessus for Windows Vulnerabilities Enables Overwrite of Arbitrary Local System Files

Read More
July 2, 2025

Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows

Read More
July 2, 2025

Linux Sudo chroot Vulnerability Enables Hackers to Elevate Privileges to Root

Read More
July 1, 2025

RansomHub Ransomware Attacking RDP Servers Using Mimikatz and Advanced IP Scanner Tools

Read More
June 30, 2025

Chrome Security Update: Patch for 11 Vulnerabilities Enabling Malicious Code Execution

Read More
June 30, 2025

Cisco Identity Services Engine RCE Vulnerability Allows Command Execution as Root User

Read More
June 29, 2025

Firefox 140 Released With Fix for Code Execution Vulnerability – Update Now

Read More
June 29, 2025

CISA Warns of FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks

Read More
June 28, 2025

TeamFiltration Pentesting Tool Weaponized to Hijack Microsoft Teams, Outlook, and Other Accounts

Read More
June 28, 2025

SonicWall warns of trojanized NetExtender stealing VPN logins

Read More
June 27, 2025

Critical OpenVPN Driver Vulnerability Allows Attackers to Crash Windows Systems

Read More
June 26, 2025

New ‘CitrixBleed2’ NetScaler ADC and Gateway Vulnerability Actively Exploited in the Wild

Read More
June 26, 2025

NCSC Warns of ‘UMBRELLA STAND’ Malware Attacking Fortinet FortiGate Firewalls

Read More
June 26, 2025

TeamViewer for Windows Vulnerability Let Attackers Delete Files Using SYSTEM Privileges

Read More
June 25, 2025

WinRAR Directory Vulnerability Allows Arbitrary Code Execution Using a Malicious File

Read More
June 24, 2025

OWASP AI Testing Guide – A New Project to Detect Vulnerabilities in AI Applications

Read More
June 24, 2025

Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS

Read More
June 24, 2025

Notepad++ Vulnerability Let Attacker Gain Complete System Control – PoC Released

Read More
June 23, 2025

Notepad++ Vulnerability Allows Full System Takeover — PoC Released

Read More
June 20, 2025

CISA Warns of iOS 0-Click Vulnerability Exploited in the Wild

Read More
June 17, 2025

Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists

Read More
June 16, 2025

Apache Tomcat Vulnerabilities Allow Authentication Bypass and DoS Attacks

Read More
June 16, 2025

Hackers Can Hide Images in Text Data and Embeds Directly into DNS TXT Records

Read More
June 13, 2025

0-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams

Read More
June 13, 2025

Windows SMB Client Zero-Day Vulnerability Exploited Using Reflective Kerberos Relay Attack

Read More
June 12, 2025

Multiple Chrome Vulnerabilities Allow Attackers to Execute Malicious Code Remotely

Read More
June 12, 2025

Windows Remote Desktop Services Vulnerability Allows Remote Code Execution

Read More
June 11, 2025

Microsoft Outlook Vulnerability Let Attackers Execute Arbitrary Code Remotely

Read More
June 10, 2025

Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide

Read More
June 9, 2025

Wireshark Certified Analyst: Official Wireshark Certification Released for Security Professionals

Read More
June 8, 2025

New Malware Attack Via “I’m not a Robot Check” to Trick Users into Running Malware

Read More
June 8, 2025

New Crocodilus Malware Let Attacker Gain Full Control of Your Android Device

Read More
June 7, 2025

PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution

Read More
June 6, 2025

Critical Linux Vulnerabilities Expose Password Hashes on Millions of Linux Systems Worldwide

Read More
June 5, 2025

New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Read More
June 5, 2025

PoC Exploit Released for Apache Tomcat DoS Vulnerability

Read More
June 4, 2025

Wireshark Vulnerability Enables DoS Attack Through Malicious Packet Injection

Read More
June 4, 2025

CISA Warns of Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code

Read More
June 3, 2025

New Phishing Attack that Hides Malicious Link from Outlook Users

Read More
June 3, 2025

Google Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code

Read More
June 2, 2025

ChoiceJacking Attack Let Hackers Compromise Android & iOS Devices via Malicious Charger

Read More
June 2, 2025

Microsoft OneDrive File Picker Vulnerability Exposes Users’ Entire Cloud Storage to Websites

Read More
May 29, 2025

Apache Tomcat CGI Servlet Vulnerability Allows Security Constraint Bypass

Read More
May 29, 2025

Weaponized Google Meet Page Tricks Users into Running PowerShell Malware

Read More
May 28, 2025

Bitwarden PDF File Handler Vulnerability Let Attackers Upload Malicious PDF Files

Read More
May 28, 2025

Chrome Security Update – High-Severity Vulnerabilities Lead to Code Execution

Read More
May 27, 2025

GitHub MCP Server Vulnerability Let Attackers Access Private Repositories

Read More
May 27, 2025

New Attack Bypasses HTTP/2 Security for Arbitrary Cross-Site Scripting

Read More
May 23, 2025

Critical vBulletin Forum Vulnerability Let Attackers Execute Remote Code

Read More
May 23, 2025

SharpSuccessor: PoC for Exploiting BadSuccessor Vulnerability in Windows Server 2025

Read More
May 23, 2025

Vulnerability in Popular macOS App Cursor Allows Malware to Bypass Privacy Protections, Exposing User Data

Read More
May 22, 2025

Fortinet Zero-Day Under Attack: PoC Now Publicly Available

Read More
May 22, 2025

Linux kernel SMB 0-Day Vulnerability Uncovered Using ChatGPT

Read More
May 22, 2025

Everest Hacking Group Claims Coca-Cola Data Breach, Exfiltrates 23 Million Records

Read More
May 22, 2025

New Attack Exploits dMSA in Windows Server 2025 to Compromise Any Active Directory Users

Read More
May 21, 2025

New Phishing Attack Mimic as Zoom Meeting Invites to Steal Login Details

Read More
May 21, 2025

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery

Read More
May 21, 2025

Windows 11 Privilege Escalation Vulnerability Let Attackers Gain Admin Access in Under 300 Milliseconds

Read More
May 20, 2025

Hackers Exploit RVTools to Deploy Bumblebee Malware on Windows Systems

Read More
May 20, 2025

Firefox 0-day Vulnerabilities Let Attackers Execute Malicious Code

Read More
May 19, 2025

Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication

Read More
May 19, 2025

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files

Read More
May 19, 2025

Google Chrome 0-Day Vulnerability Exploited in the Wild – Update Now

Read More
May 18, 2025

SAP May 2025 Patch Tuesday – Patch for Actively Exploited 0-Day & 15 Vulnerabilities

Read More
May 18, 2025

Microsoft Defender Vulnerability Allows Attackers to Elevate Privileges

Read More
May 17, 2025

Node.js Vulnerability Allows Attackers to Crash the Process & Halt Services

Read More
May 16, 2025

VMware Tools Vulnerability Let Attackers Tamper Files to Trigger Malicious Operations

Read More
May 16, 2025

Xanthorox – New BlackHat AI Tool Used to Launch Phishing & Malware Attacks

Read More
May 15, 2025

Hackers Attacking Windows IIS Web Server With Native Module Malware

Read More
May 15, 2025

BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability: PoC Released

Read More
May 13, 2025

FortiOS Authentication Bypass Vulnerability Lets Attackers Take Full Control of Device

Read More
May 12, 2025

Kimsuky Hacker Group Employs New Phishing Tactics & Malware Infections

Read More
May 12, 2025

Hackers Leverage JPG Images to Execute Fully Undetectable Ransomware

Read More
May 12, 2025

Defendnot — A New Tool That Disables Windows Defender by Posing as an Antivirus Solution

Read More
May 9, 2025

160-Year-Old IT Firm Closed Following Ransomware Attack: Director Sounds Alarm

Read More
May 6, 2025

Hackers Selling SS7 0-Day Vulnerability on Hacker Forums for $5000

Read More
May 6, 2025

Threat Actor Bypass SentinelOne EDR to Deploy Babuk Ransomware

Read More
May 6, 2025

Critical Microsoft Telnet 0-Click Vulnerability Exposes Windows Credentials

Read More
May 5, 2025

Critical Webmin Vulnerability Let Remote Attackers Escalate Privileges to Root-Level

Read More
May 5, 2025

New Chimera Malware That Outsmarts Antivirus, Firewalls, & Humans

Read More
May 4, 2025

New iOS Critical Vulnerability That Could Brick iPhones With a Single Line of Code

Read More
May 1, 2025

Oracle VirtualBox Vulnerability Exposes Systems to Privilege Escalation Attacks

Read More
April 30, 2025

Unpatched Windows Shortcut Vulnerability Let Attackers Execute Remote Code – PoC Released

Read More
April 29, 2025

Apache Tomcat Vulnerability Let Attackers Bypass Rules & Trigger DoS Condition

Read More
April 29, 2025

Kali Linux Warns that Update Process is Going to Fail for All Users

Read More
April 24, 2025

SonicWall SSLVPN Vulnerability Let Remote Attackers Crash Firewall Appliances

Read More
April 22, 2025

'Cookie Bite' Entra ID Attack Exposes Microsoft 365

Read More
April 21, 2025

New Phishing Attack Appending Weaponized HTML Files Inside SVG Files

Read More
April 3, 2025

New Phishing Campaign Attacking Investors to Steal Login Credentials

Read More
April 3, 2025

WinRAR “Mark of the Web” Bypass Vulnerability Let Attackers Arbitrary Code

Read More
April 3, 2025

Hackers Exploiting Apache Tomcat Vulnerability to Steal SSH Credentials & Gain Server Control

Read More
April 3, 2025

SonicWall Firewall Vulnerability Exploited to Gain Unauthorized Network Access

Read More
March 20, 2025

Babuk Ransomware Group Claims Attack on Telecommunication Firm Orange

Read More
February 18, 2025

CISA Warns of SonicWall SonicOS RCE Vulnerability Actively Exploited in the Wild

Read More
January 24, 2025

New JavaScript Attack Hijacking Government And University Websites

Read More
January 18, 2025

FlowerStorm “Phishing-as-a-Service” Attacking Microsoft Users With Fake Login Pages

Read More
January 2, 2025

Windows 11 BitLocker Encryption Bypassed To Extract Volume Encryption Keys

Read More
August 25, 2024

Top Challenges Faced by vCISOs and How to Overcome Them

Read More
August 25, 2024

How vCISOs Are Transforming Cybersecurity for Remote and Hybrid Work Environments

Read More
August 25, 2024

How a vCISO Can Help Achieve Compliance with Regulatory Requirements

Read More
August 25, 2024

 Real-Life Cyber Attacks Prevented by VAPT: Success Stories from the Field

Read More
August 25, 2024

The Importance of VAPT in Cybersecurity: Protecting Your Digital Assets

Read More
August 25, 2024

VAPT for Small and Medium Enterprises (SMEs): Why It Matters and How to Get Started

Read More
August 25, 2024

Building a Robust Managed Threat Detection and Response Strategy

Read More
August 25, 2024

The Benefits of Managed Threat Detection and Response

Read More
August 25, 2024

An Introduction to Managed Threat Detection and Response

Read More
August 25, 2024

The Role of Unified SIEM and XDR in Compliance and Risk Management

Read More
August 25, 2024

How Unified SIEM and XDR Enhance Threat Detection and Response

Read More
August 25, 2024

Top 5 Tips for Telecommunication Staffing

Read More
August 25, 2024

Understanding Unified SIEM and XDR: The Future of Cybersecurity

Read More
August 25, 2024

Tackling Staff Shortages with On-Demand Healthcare Staffing

Read More
August 25, 2024

Role of Float Pools in Healthcare Staffing

Read More
August 25, 2024

GDPR Compliance in the E-Commerce Industry: Protecting Customer Data in the Digital Age

Read More
August 25, 2024

SOC 2 Compliance in the Technology Industry: Ensuring Trust and Security

Read More
August 25, 2024

HIPAA Compliance in the Healthcare Industry: Ensuring Patient Privacy in a Digital World

Read More
August 25, 2024

 ISO 27001 Compliance in the Finance Industry: Safeguarding Sensitive Data

Read More
August 25, 2024

PCI-DSS Compliance for the Retail Industry: Staying Ahead in the Era of Digital Transactions

Read More
August 25, 2024

GDPR Compliance: Protecting Personal Data in the EU

Read More
August 25, 2024

HIPAA Compliance: Protecting Health Information

Read More
August 25, 2024

ISO 27001 Compliance: The Gold Standard for Information Security

Read More
August 25, 2024

Understanding PCI-DSS Compliance: Essential for Protecting Payment Data

Read More
August 25, 2024

5 Simple Ways to Protect Data Assets

Read More
August 25, 2024

Automating Threat Hunting

Read More
August 25, 2024

Security for Chatbots

Read More
August 24, 2024

Antivirus Software may not be enough

Read More
August 24, 2024

Securing Remote Work: Best Practices for Remote Access Security

Read More
August 24, 2024

The Role of Managed Security Services in Cyber Defense

Read More
August 24, 2024

The Rise of Ransomware Attacks: How to Defend Against Them

Read More
August 24, 2024

Building a Cyber Incident Response Plan: Key Components and Best Practices

Read More
August 24, 2024

Protecting Your Data: Best Practices for Data Encryption

Read More
August 24, 2024

Understanding the Basics of Penetration Testing

Read More
August 24, 2024

Securing Your Operational Technology Environment: Importance of Cybersecurity and Strategies for Improvement

Read More
August 24, 2024

The Importance of Security Awareness Training for Employees

Read More
August 24, 2024

Enhance Your Organization’s Cybersecurity with iSecurify’s Virtual Chief Information Security Officer (vCISO) Services

Read More
August 23, 2024

Top 10 Cybersecurity Threats Facing Businesses in 2024

Read More
August 13, 2024

Defending Against Phishing and Social Engineering Attacks: The Power of Awareness

Read More
TAKE THE NEXT STEP

Ready to Learn More?

Get Free Trial
©2024 iSecurify. All Rights Reserved.