Posts | Rating | new post |
| GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS | 0 user ratings | 2025-12-31 17:29:30 By: milo |
| New Cybercrime Tool ErrTraffic Enables Automated ClickFix Attacks | 0 user ratings | 2025-12-31 17:29:30 By: milo |
| NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework | 0 user ratings | 2025-12-31 17:29:30 By: milo |
| New Open-Source C2 Framework AdaptixC2 Debuts With Improved Stability and Speed | 0 user ratings | 2025-12-31 05:37:35 By: milo |
| New AI-Enhanced Crypter Promoted as Capable of Evading Windows Defender | 0 user ratings | 2025-12-31 05:37:35 By: milo |
| Chinese Hackers Deploy Rootkit to Stealthily Mask ToneShell Malware | 0 user ratings | 2025-12-30 17:31:40 By: milo |
| Hackers Impersonated Jackson JSON Library to Infiltrate Maven Central | 0 user ratings | 2025-12-30 17:31:39 By: milo |
| CISA Alerts on Active Exploitation of MongoDB Vulnerability CVE-2025-14847 | 0 user ratings | 2025-12-30 17:31:39 By: milo |
| Hackers Abuse Copilot Studio s New Connected Agents Feature to Plant Backdoors | 0 user ratings | 2025-12-30 17:31:39 By: milo |
| New Spear-Phishing Attack Targeting Security Individuals in the Israel Region | 0 user ratings | 2025-12-30 17:31:38 By: milo |
| Critical SmarterMail Flaw Allows Attackers to Execute Remote Code | 0 user ratings | 2025-12-30 17:31:38 By: milo |
| Hackers Promote VOID AV Killer Claiming Kernel-Level Defense Evasion | 0 user ratings | 2025-12-30 17:31:37 By: milo |
| Critical IBM API Connect Flaw Allows Attackers to Bypass Authentication | 0 user ratings | 2025-12-30 17:31:37 By: milo |
| ESET Flags Rising Threat of AI-Driven Malware and Ransomware | 0 user ratings | 2025-12-30 17:31:37 By: milo |
| Magecart Campaign Deploys 50+ Malicious Scripts to Hijack E-Commerce Transactions | 0 user ratings | 2025-12-30 17:31:36 By: milo |
| What Will Be Key Cybersecurity Issues in 2026? | 0 user ratings | 2025-12-30 17:08:45 By: milo |
| Digital Forensics: Browser Fingerprinting – Visual Identification Techniques, Part 1 | 0 user ratings | 2025-12-30 15:23:11 By: milo |
| ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories - thehackernews.com | 0 user ratings | 2025-12-30 15:13:09 By: milo |
| How to Integrate AI into Modern SOC Workflows | 0 user ratings | 2025-12-30 10:43:22 By: milo |
| What Flow Network s isolated recovery plan after $3.9 mln hack entails - AMBCrypto | 0 user ratings | 2025-12-30 05:34:55 By: milo |
| EmEditor Website Breach Used to Spread Infostealer Malware | 0 user ratings | 2025-12-30 05:34:27 By: milo |
| 70,000+ MongoDB Servers Exposed After MongoBleed PoC Released | 0 user ratings | 2025-12-30 05:34:27 By: milo |
| Operational Noise in Windows Event Logs During Advanced Cyberattacks | 0 user ratings | 2025-12-29 17:31:37 By: milo |
| Hunting Windows LPE Flaws Through Kernel Drivers and Named Pipes | 0 user ratings | 2025-12-29 17:31:36 By: milo |
| OpenAI Strengthens ChatGPT Atlas Security to Block Prompt Injection Attacks | 0 user ratings | 2025-12-29 17:31:36 By: milo |