This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
PoC Exploit Released for Critical Linux Kernel Privileg...
A critical privilege escalation vulnerability (CVE-2024-53141) in the Linux kernel's ipset component has been disclosed, with a pr...
Vulnerabilities Applied to Cisco and Atlassian Product...
Atlassian and Cisco have both released important updates to fix serious security issues in their products. These issues could allo...
Attacks Targeted the New Windows NTLM Vulnerability
Check Point has alerted that hackers began to exploit a Windows NTLM vulnerability about a week after patches were released last m...
Attacks against GPS Spoofing Increase in Southeast Asia...
In 2025, spoofing attacks on GPS are still causing significant issues for both air and sea travel. These problems became much more...
Apple Uses Patches for iOS and MacOS to Stop Two Zero-D...
Apple recently issued emergency updates to address two security issues in its operating systems. These problems were used in highl...
For Years, Windows Has Been the Target of MITRE Hackers...
New versions of the BrickStorm backdoor, which played a role in a major hack on MITRE in early 2024, now target Windows systems ac...
Tails 6.14.2 Released: Urgent Security Update to Patch ...
The Tails Project has released an emergency update, Tails 6.14.2, to address critical security vulnerabilities in the Linux kernel...
Apple Patches Two Zero-Day Flaws Exploited in Sophistic...
Apple has released iOS 18.4.1 and iPadOS 18.4.1 to fix two critical zero-day vulnerabilities exploited in highly targeted cyberatt...
Chinese hackers use the VShell tool and the SNOWLIGHT m...
A group associated with China, known as UNC5174, has launched a new cyber attack campaign. They’re using a modified version of mal...
Chinese Android phones that target cryptocurrency users...
Cheap Android smartphones from certain Chinese manufacturers have been discovered with harmful apps pre-installed. These apps pret...
Cybersecurity Firm Offers to Buy Dark Web Accounts for ...
Threat intelligence firm Prodaft is introducing an unconventional strategy to gather insights from the cybercriminal underground: ...
Malicious NPM Packages Target PayPal and Crypto Wallet ...
Cybercriminals are exploiting malicious NPM packages to steal personal data and siphon funds from PayPal users and cryptocurrency ...