Category: Vulnerability Alerts

Cybercriminals Target GitHub Users with 67 Fake Hacking...

Security researchers have identified a malicious campaign where attackers created over 67 fraudulent GitHub repositories masquerad...

Silver Fox APT Escalates Multi-Stage Cyber Campaign Aga...

Security experts have identified an escalating cyber threat targeting Taiwanese organizations through a sophisticated phishing ope...

Discord Invite Hijacking Campaign Delivers Crypto-Targe...

A sophisticated cyber attack is leveraging vulnerabilities in Discord's invitation infrastructure to distribute the Skuld informat...

Apple Confirms Zero-Click iMessage Exploit Used to Depl...

Apple has confirmed that a critical security vulnerability in its Messages application was actively exploited by sophisticated thr...

Ex-Black Basta Operatives Adapt Tactics with Python Scr...

Following the significant disruption of the Black Basta ransomware operation after internal communications were publicly exposed i...

Cybercriminals Weaponize Job Platforms: FIN6 Group Expl...

The cybercriminal organization FIN6 has adopted a sophisticated social engineering approach, using fraudulent job seeker profiles ...

Digital Detective Work: How a JavaScript Experiment Exp...

A cybersecurity researcher's curiosity about Google's functionality without JavaScript accidentally uncovered a critical vulnerabi...

Triple Threat: Supply Chain Attacks Target Popular Deve...

Security researchers at Aikido Security have uncovered a sophisticated supply chain attack that compromised more than a dozen pack...

Critical Shared Credentials Flaw Exposes Cisco ISE Clou...

A critical security weakness has been discovered in cloud-based deployments of Cisco's Identity Services Engine (ISE) across Amazo...

The Voice of Deception: How Elite Phone Scammers Are Hi...

Google's Threat Intelligence Group has uncovered a sophisticated cybercriminal operation that represents a new evolution in corpor...

DevOps Infrastructure Under Siege: Multi-Platform Crypt...

Security researchers have identified a sophisticated cryptocurrency mining operation targeting vulnerable DevOps platforms and dev...

Critical Race Conditions in Linux Core Dump Systems Exp...

Cybersecurity researchers at Qualys have uncovered two significant security flaws affecting core dump handling mechanisms in major...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.