Posts | Rating | new post |
GMX suffers $42M hack, issues 10% bounty offer to hacker - CryptoSlate | 0 user ratings | 2025-07-09 15:44:03 By: milo |
Supply Chain Attack Unleashed via Compromised VS Code Extension | 0 user ratings | 2025-07-09 14:34:12 By: milo |
SparkKitty Malware Steals Photos from iOS and Android Devices | 0 user ratings | 2025-07-09 13:57:12 By: milo |
TapTrap Android Exploit Allows Malicious Apps to Bypass Permissions | 0 user ratings | 2025-07-09 13:26:41 By: milo |
Microsoft Fixes Wormable Remote Code Execution Flaw in Windows and Server | 0 user ratings | 2025-07-09 13:19:13 By: milo |
FUNNULL Uses Amazon and Microsoft Cloud to Hide Malicious Infrastructure | 0 user ratings | 2025-07-09 13:03:21 By: milo |
Google Launches Advanced Protection for Vulnerable Users via Chrome on Android | 0 user ratings | 2025-07-09 11:57:07 By: milo |
Hackers Exploit IIS Machine Keys to Breach Organizations | 0 user ratings | 2025-07-09 11:42:11 By: milo |
Microsoft 365 PDF Export Feature Vulnerable to LFI Sensitive Data at Risk | 0 user ratings | 2025-07-09 11:27:16 By: milo |
XwormRAT Hackers Leverage Code Injection for Sophisticated Malware Deployment | 0 user ratings | 2025-07-09 10:49:17 By: milo |
Anatsa Android Banking Malware Targets Users in the U.S. and Canada via Google Play | 0 user ratings | 2025-07-09 09:24:51 By: milo |
Windows BitLocker Vulnerability Lets Attackers Bypass Security Protections | 0 user ratings | 2025-07-09 08:41:13 By: milo |
Splunk SOAR Addresses Vulnerabilities in Third-Party Packages Update Now | 0 user ratings | 2025-07-09 07:31:57 By: milo |
Splunk Enterprise Addresses Vulnerabilities in Bundled Third-Party Packages – Update Now | 0 user ratings | 2025-07-09 06:33:41 By: milo |
Citrix Windows Virtual Delivery Agent Vulnerability Lets Attackers Escalate to SYSTEM Privileges | 0 user ratings | 2025-07-09 05:56:44 By: milo |
FortiWeb SQL Injection Vulnerability Allows Attackers to Execute Malicious SQL Commands | 0 user ratings | 2025-07-09 05:40:51 By: milo |
Zoom for Windows Flaw Allows Attackers to Trigger DoS Attacks | 0 user ratings | 2025-07-09 04:59:19 By: milo |
11 Google-Verified Chrome Extensions Infected Over 1.7 Million Users | 0 user ratings | 2025-07-08 21:23:48 By: milo |
New Report Finds Billions of Leaked Credentials and ULP Files on Dark Web Are Outdated | 0 user ratings | 2025-07-08 20:55:11 By: milo |
China-Linked VELETRIX Loader Used in Attacks on Telecommunications Infrastructure | 0 user ratings | 2025-07-08 20:35:06 By: milo |
XMRig Malware Disables Windows Updates and Scheduled Tasks to Maintain Persistence | 0 user ratings | 2025-07-08 20:04:14 By: milo |
BERT Ransomware Can Force Shutdown of ESXi Virtual Machines to Hinder Recovery | 0 user ratings | 2025-07-08 19:35:03 By: milo |
Hackers Manipulate Search Results to Target IT Pros with Trojanized PuTTY and WinSCP | 0 user ratings | 2025-07-08 19:11:50 By: milo |
Researchers Reveal Scatter Spider s Tools, Tactics, and Key Indicators | 0 user ratings | 2025-07-08 18:41:09 By: milo |
New LogoKit Phishing Campaign Exploits Cloudflare Turnstile and Amazon S3 for Higher Success Rates | 0 user ratings | 2025-07-08 18:11:21 By: milo |