Home

img

Google Introduces AI-Powered Scam Detection for Android...

Google has unveiled new AI-driven scam detection features for Android devices, aimed at safeguarding users from fraudulent schemes...

Lotus Panda Expands Cyber Espionage Operations with Upg...

A Chinese state-backed hacking group, known as Lotus Panda (aka Billbug, Lotus Blossom, Bronze Elgin, Spring Dragon, and Thrip), h...

North Korean Hackers Masquerade as IT Professionals in ...

Cybersecurity researchers have uncovered new tactics in an ongoing scheme where North Korean-linked hackers pose as fake IT profes...

Typosquatting Attack Targets Go Ecosystem with Maliciou...

Cybersecurity researchers have uncovered an ongoing software supply chain attack targeting the Go ecosystem, using typosquatted pa...

Google Patches 44 Android Vulnerabilities in March 2025...

Google has released its March 2025 Android Security Bulletin, addressing 44 security flaws, including two high-severity vulnerabil...

CISA Flags Actively Exploited Vulnerabilities in Cisco,...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five newly identified security flaws affecting Cisco, H...

Phishing Campaign Exploits Fake CAPTCHAs in PDFs to Spr...

Cybersecurity researchers have uncovered a large-scale phishing campaign that uses fake CAPTCHA images embedded in PDF documents t...

Phishing Campaign Exploits Fake CAPTCHAs in PDFs to Spr...

A rapidly evolving botnet malware known as Vo1d has been actively compromising Android TV devices across multiple countries, inclu...

Critical Vulnerability in LibreOffice Exposes Windows U...

A high-severity vulnerability (CVE-2025-0514) in LibreOffice versions before 24.8.5 allows attackers to execute malicious files on...

Critical Command Injection Vulnerability Discovered in ...

Cisco has issued a security advisory regarding a critical vulnerability (CVE-2025-20161) affecting the Nexus 3000 and 9000 Series ...

Anubis Ransomware Emerges as a New Threat to Critical I...

A newly identified ransomware group, Anubis, is employing a mix of double extortion tactics, ransomware-as-a-service (RaaS), and a...

FBI Links Record-Breaking $1.5 Billion Bybit Hack to No...

The U.S. Federal Bureau of Investigation (FBI) has officially attributed the $1.5 billion cryptocurrency theft from Bybit to North...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.