cybersecurity threat

Artificial Intelligence

Chrome Extensions Stole ChatGPT & DeepSeek Data from 900K Users

Malicious Chrome extensions, posing as legitimate AI tools, stole private conversations and browsing data from over 900,000 users by secretly…

Read More »
Business

VVS Stealer Malware Hijacks Discord Accounts Using Python

A new, affordable Python-based malware called **VVS Stealer** is actively compromising Discord accounts by stealing tokens and data, using obfuscation…

Read More »
Business

Critical Flaw Exposes 10K+ Fortinet Firewalls to 2FA Bypass

A critical five-year-old Fortinet firewall flaw (CVE-2020-12812) allows attackers to bypass two-factor authentication by altering a username's case, and over…

Read More »
AI & Tech

Beware: Google Ads Push Malware via Fake ChatGPT, Grok Guides

A new malware campaign called "ClickFix" uses Google Ads impersonating AI platform guides to distribute the AMOS infostealer, tricking users…

Read More »
BigTech Companies

Beware Malicious VS Code Extensions Stealing Data

Malicious extensions named Bitcoin Black and Codo AI were discovered on the VS Code marketplace, using social engineering and functional…

Read More »
Business

Inside DragonForce Ransomware and Scattered Spider

The DragonForce ransomware operation has evolved into a "cartel" model, offering affiliates high profit shares to scale its impact, and…

Read More »
Cybersecurity

RondoDox Botnet Exploits Critical XWiki Server Flaw

The RondoDox botnet malware is actively exploiting a critical remote code execution vulnerability (CVE-2025-24893) in XWiki Platform, as confirmed by…

Read More »
BigTech Companies

Google: Microsoft WSUS Attacks Strike Multiple Organizations

A critical remote code execution vulnerability (CVE-2025-59287) in Microsoft's WSUS is being actively exploited, affecting Windows Server versions from 2012…

Read More »
Business

Hackers Exploit Critical Oracle Flaw, CISA Confirms

CISA has added the critical Oracle E-Business Suite vulnerability CVE-2025-61884 to its Known Exploited Vulnerabilities catalog, confirming active exploitation and…

Read More »
BigTech Companies

Barracuda Exposes Stealthy Microsoft 365 Phishing Kit

Whisper 2FA is a sophisticated phishing-as-a-service platform that has compromised nearly one million Microsoft 365 accounts by stealing login credentials…

Read More »
Business

Nation-State Hackers Breach F5, Endangering Thousands of Customers

A nation-state hacking group infiltrated F5's networks, compromising thousands of organizations, including US government agencies and Fortune 500 companies, posing…

Read More »
Business

ClickFix Phishing Kit Exposed by Cybersecurity Experts

Palo Alto Networks has identified the IUAM ClickFix Generator, a phishing toolkit that enables even novice cybercriminals to create convincing…

Read More »
Cybersecurity

LockBit’s Newest Ransomware Is Its Most Dangerous Threat Yet

LockBit 5.0 is a new, more dangerous ransomware variant targeting Windows, Linux, and VMware ESXi platforms, posing a cross-platform threat…

Read More »
Business

SonicWall SMA100 Update Eradicates Rootkit Malware

SonicWall has released a critical firmware update for its SMA 100 series appliances that can eradicate the OVERSTEP rootkit malware,…

Read More »
Business

Akira Ransomware Actively Exploits Critical SonicWall VPN Flaw

The Akira ransomware group is exploiting CVE-2024-40766, a known vulnerability in SonicWall VPN appliances, to breach unpatched corporate networks. Despite…

Read More »
BigTech Companies

Global Warlock Ransomware Spreads via SharePoint Exploit

A global ransomware campaign called Warlock is exploiting a critical Microsoft SharePoint vulnerability to compromise networks, escalate privileges, and deploy…

Read More »
Cybersecurity

Hackers Target SAP NetWeaver Flaw to Spread Linux Auto-Color Malware

Cybersecurity experts discovered a sophisticated attack using a critical SAP NetWeaver vulnerability (CVE-2025-31324) to deploy Auto-Color malware on Linux systems,…

Read More »
BigTech Companies

Chinese Hackers Exploit SharePoint Zero-Day, Warn Google & Microsoft

Google and Microsoft experts discovered a critical SharePoint vulnerability (CVE-2025-53770) exploited by Chinese state-sponsored hackers to steal encryption keys and…

Read More »
Cybersecurity

SonicWall SMA Devices Still Infected with Stealthy OVERSTEP Malware

Cybersecurity experts discovered a malware campaign targeting outdated SonicWall SMA 100 devices, deploying the stealthy OVERSTEP backdoor via stolen admin…

Read More »
Cybersecurity

Black Claw Ransomware: Decrypt .bclaw & .apocalypse Files

Black Claw ransomware encrypts files with .bclaw and .apocalypse extensions, demanding cryptocurrency payments for decryption, posing a serious cybersecurity threat.…

Read More »