Malicious Chrome extensions, posing as legitimate AI tools, stole private conversations and browsing data from over 900,000 users by secretly…
Read More »cybersecurity threat
A new, affordable Python-based malware called **VVS Stealer** is actively compromising Discord accounts by stealing tokens and data, using obfuscation…
Read More »A critical five-year-old Fortinet firewall flaw (CVE-2020-12812) allows attackers to bypass two-factor authentication by altering a username's case, and over…
Read More »A new malware campaign called "ClickFix" uses Google Ads impersonating AI platform guides to distribute the AMOS infostealer, tricking users…
Read More »Malicious extensions named Bitcoin Black and Codo AI were discovered on the VS Code marketplace, using social engineering and functional…
Read More »The DragonForce ransomware operation has evolved into a "cartel" model, offering affiliates high profit shares to scale its impact, and…
Read More »The RondoDox botnet malware is actively exploiting a critical remote code execution vulnerability (CVE-2025-24893) in XWiki Platform, as confirmed by…
Read More »A critical remote code execution vulnerability (CVE-2025-59287) in Microsoft's WSUS is being actively exploited, affecting Windows Server versions from 2012…
Read More »CISA has added the critical Oracle E-Business Suite vulnerability CVE-2025-61884 to its Known Exploited Vulnerabilities catalog, confirming active exploitation and…
Read More »Whisper 2FA is a sophisticated phishing-as-a-service platform that has compromised nearly one million Microsoft 365 accounts by stealing login credentials…
Read More »A nation-state hacking group infiltrated F5's networks, compromising thousands of organizations, including US government agencies and Fortune 500 companies, posing…
Read More »Palo Alto Networks has identified the IUAM ClickFix Generator, a phishing toolkit that enables even novice cybercriminals to create convincing…
Read More »LockBit 5.0 is a new, more dangerous ransomware variant targeting Windows, Linux, and VMware ESXi platforms, posing a cross-platform threat…
Read More »SonicWall has released a critical firmware update for its SMA 100 series appliances that can eradicate the OVERSTEP rootkit malware,…
Read More »The Akira ransomware group is exploiting CVE-2024-40766, a known vulnerability in SonicWall VPN appliances, to breach unpatched corporate networks. Despite…
Read More »A global ransomware campaign called Warlock is exploiting a critical Microsoft SharePoint vulnerability to compromise networks, escalate privileges, and deploy…
Read More »Cybersecurity experts discovered a sophisticated attack using a critical SAP NetWeaver vulnerability (CVE-2025-31324) to deploy Auto-Color malware on Linux systems,…
Read More »Google and Microsoft experts discovered a critical SharePoint vulnerability (CVE-2025-53770) exploited by Chinese state-sponsored hackers to steal encryption keys and…
Read More »Cybersecurity experts discovered a malware campaign targeting outdated SonicWall SMA 100 devices, deploying the stealthy OVERSTEP backdoor via stolen admin…
Read More »Black Claw ransomware encrypts files with .bclaw and .apocalypse extensions, demanding cryptocurrency payments for decryption, posing a serious cybersecurity threat.…
Read More »


















