Posts | Rating | new post |
WhatsApp Just Patched a Zero Click Bug Being Used to Hack Apple Users - Gizmodo | 0 user ratings | 2025-08-30 16:22:38 By: milo |
Google Urges 2.5B Gmail Users to Reset Passwords After Salesforce Breach | 0 user ratings | 2025-08-30 12:19:06 By: milo |
QNAP Flaw Allows Attackers to Bypass Authentication | 0 user ratings | 2025-08-30 09:51:17 By: milo |
Citrix 0-Day Flaw Under Active Exploitation Since May | 0 user ratings | 2025-08-30 09:51:17 By: milo |
Amazon Takes Down Russian APT29 Infrastructure Targeting Users | 0 user ratings | 2025-08-30 09:51:16 By: milo |
WhatsApp fixed a zero-click bug in its iOS and Mac apps that was being used, alongside a now-fixed Apple flaw, to hack into devices of "specific | 0 user ratings | 2025-08-29 19:26:06 By: milo |
WhatsApp Zero-Day Vulnerability Exploited with 0-Click Attacks to Hack Apple Devices | 0 user ratings | 2025-08-29 19:21:22 By: milo |
WhatsApp fixes zero-click bug used to hack Apple users with spyware - TechCrunch | 0 user ratings | 2025-08-29 18:18:05 By: milo |
Open Source Intelligence: Free Satellite Services for Investigations | 0 user ratings | 2025-08-29 14:22:13 By: milo |
Weaponized PDFs and LNK Files Used in Windows Attacks | 0 user ratings | 2025-08-29 14:10:06 By: milo |
VS Code Marketplace Abused by Threat Actors to Deliver Malware via Trusted Extensions | 0 user ratings | 2025-08-29 13:52:09 By: milo |
AppSuite PDF Editor Exploit Lets Hackers Run Arbitrary Commands | 0 user ratings | 2025-08-29 13:27:15 By: milo |
Critical Hikvision Vulnerabilities Allow Remote Command Injection | 0 user ratings | 2025-08-29 12:25:10 By: milo |
VirusTotal Launches Endpoint That Explains Code Functionality for Malware Analysts | 0 user ratings | 2025-08-29 12:07:22 By: milo |
Popular Nx Packages Compromised by Credential-Stealing Malware | 0 user ratings | 2025-08-29 10:58:12 By: milo |
Microsoft Teams Abused in Cyberattack Delivering PowerShell-Based Remote Access Malware | 0 user ratings | 2025-08-29 10:08:15 By: milo |
TransUnion Data Breach Compromises Over 4 Million Customers | 0 user ratings | 2025-08-29 09:42:24 By: milo |
DPRK Remote Work Tactics: Leveraging Code-Sharing Platforms | 0 user ratings | 2025-08-29 08:34:21 By: milo |
Mac Malware JSCoreRunner Abuses Online PDF Tool to Spread | 0 user ratings | 2025-08-29 07:35:04 By: milo |
Threat Actors Use Facebook Ads to Deliver Android Malware | 0 user ratings | 2025-08-29 07:35:04 By: milo |
New Mac Malware Dubbed “JSCoreRunner” Weaponizing PDF Conversion Site to Deliver Malware | 0 user ratings | 2025-08-29 06:52:05 By: milo |
Silver Fox Hackers Use Driver Vulnerability to Evade Security on Windows Systems | 0 user ratings | 2025-08-29 06:35:10 By: milo |
RedExt – Browser Extension-Based C2 Framework for Red Team Recon | 0 user ratings | 2025-08-29 01:00:12 By: milo |
How SafeLine WAF Turns Hackers Scanners into Trash | 0 user ratings | 2025-08-28 17:59:26 By: milo |
Cisco IMC Virtual Keyboard Vulnerability Allows Attackers to Redirect Users to Malicious Websites | 0 user ratings | 2025-08-28 16:50:21 By: milo |