Home

img

Using An Exploit Chain, Serbian Police Hack A Protester...

According To Amnesty International, The Hack Raises Concerns About Ethical Technology Development Since Serbian Police Employed An...

Elastic Patches Critical Kibana Vulnerability Allowing ...

Elastic has released security updates to fix a critical vulnerability in Kibana, the data visualization dashboard for Elasticsearc...

Bybit $1.5B Crypto Heist Linked to North Korean Hackers...

Cybersecurity firm Safe{Wallet} has identified the Bybit $1.5 billion cryptocurrency heist as a highly advanced, state-sponsored a...

China-Linked Silk Typhoon Hackers Shift Focus to IT Sup...

The Silk Typhoon hacking group, previously known as Hafnium, has evolved its tactics, now targeting IT supply chains to gain entry...

Google Introduces AI-Powered Scam Detection for Android...

Google has unveiled new AI-driven scam detection features for Android devices, aimed at safeguarding users from fraudulent schemes...

Lotus Panda Expands Cyber Espionage Operations with Upg...

A Chinese state-backed hacking group, known as Lotus Panda (aka Billbug, Lotus Blossom, Bronze Elgin, Spring Dragon, and Thrip), h...

North Korean Hackers Masquerade as IT Professionals in ...

Cybersecurity researchers have uncovered new tactics in an ongoing scheme where North Korean-linked hackers pose as fake IT profes...

Typosquatting Attack Targets Go Ecosystem with Maliciou...

Cybersecurity researchers have uncovered an ongoing software supply chain attack targeting the Go ecosystem, using typosquatted pa...

Google Patches 44 Android Vulnerabilities in March 2025...

Google has released its March 2025 Android Security Bulletin, addressing 44 security flaws, including two high-severity vulnerabil...

CISA Flags Actively Exploited Vulnerabilities in Cisco,...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added five newly identified security flaws affecting Cisco, H...

Phishing Campaign Exploits Fake CAPTCHAs in PDFs to Spr...

Cybersecurity researchers have uncovered a large-scale phishing campaign that uses fake CAPTCHA images embedded in PDF documents t...

Phishing Campaign Exploits Fake CAPTCHAs in PDFs to Spr...

A rapidly evolving botnet malware known as Vo1d has been actively compromising Android TV devices across multiple countries, inclu...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.