Posts | Rating | new post |
| Warlock Ransomware Exploits SharePoint ToolShell Zero-Day in New Attack Campaign | 0 user ratings | 2025-10-23 10:38:03 By: milo |
| OpenAI Faces DHS Request to Disclose User s ChatGPT Prompts in Investigation | 0 user ratings | 2025-10-23 10:19:32 By: milo |
| New Python-Based RAT Disguised as Minecraft App Steals Sensitive User Data | 0 user ratings | 2025-10-23 09:52:02 By: milo |
| Post-Quantum Cryptography in 2025 – Migration Paths, Early Movers and CISO RedTeam Impact | 0 user ratings | 2025-10-23 09:07:41 By: milo |
| SideWinder Leverages ClickOnce Installer to Deliver StealerBot Malware | 0 user ratings | 2025-10-23 08:12:41 By: milo |
| BIND 9 Vulnerabilities Expose DNS Servers to Cache Poisoning and DoS | 0 user ratings | 2025-10-23 07:01:39 By: milo |
| New Malware Toolkit from MuddyWater Delivers Phoenix Backdoor to Global Targets | 0 user ratings | 2025-10-23 06:52:13 By: milo |
| TARmageddon Security Flaw in Rust Library Could Lead to Config Tampering and RCE | 0 user ratings | 2025-10-23 06:52:13 By: milo |
| PhantomCaptcha RAT Uses Weaponized PDFs and ClickFix Cloudflare CAPTCHA Pages to Deliver Malware | 0 user ratings | 2025-10-23 06:16:38 By: milo |
| Critical Argument Injection Flaw in AI Agents Enables Remote Code Execution | 0 user ratings | 2025-10-23 06:07:11 By: milo |
| Critical MCP Server Flaw Exposes Over 3,000 Servers and Thousands of API Keys | 0 user ratings | 2025-10-23 05:49:34 By: milo |
| Open Source Intelligence (OSINT): Using Overpass Turbo for Strategic CyberWar Intelligence Gathering | 0 user ratings | 2025-10-22 16:46:37 By: milo |
| Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters | 0 user ratings | 2025-10-22 13:36:52 By: milo |
| Fileless Remcos Attacks: Injecting Malicious Code into RMClient to Evade EDR | 0 user ratings | 2025-10-22 13:16:59 By: milo |
| Threat Actors Exploiting Azure Blob Storage to Breach Organizational Repositories | 0 user ratings | 2025-10-22 12:49:54 By: milo |
| SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion | 0 user ratings | 2025-10-22 12:23:28 By: milo |
| Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data | 0 user ratings | 2025-10-22 11:58:25 By: milo |
| Hackers Use ASP.NET Machine Keys to Break Into IIS, Push Malicious Extensions | 0 user ratings | 2025-10-22 11:31:40 By: milo |
| Bitter APT Exploits WinRAR Zero-Day Through Malicious Word Files to Steal Sensitive Data | 0 user ratings | 2025-10-22 10:11:28 By: milo |
| Vidar Stealer Exploits: Direct Memory Attacks Used to Capture Browser Credentials | 0 user ratings | 2025-10-22 08:04:18 By: milo |
| Millions of Credentials Stolen Each Day by Stealer Malware | 0 user ratings | 2025-10-22 07:03:24 By: milo |
| New Rust Malware ChaosBot Hides Command-and-Control Inside Discord | 0 user ratings | 2025-10-22 06:36:16 By: milo |
| New Salt Typhoon Attacks Leverage Zero-Days and DLL Sideloading | 0 user ratings | 2025-10-22 05:50:19 By: milo |
| Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets | 0 user ratings | 2025-10-22 05:04:21 By: milo |
| A US judge orders Mark Zuckerberg, Evan Spiegel, and Adam Mosseri to testify in the "first bellwether trial" over child social media safety, | 0 user ratings | 2025-10-21 16:16:28 By: milo |