Posts | Rating | new post |
| SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums | 0 user ratings | 2025-12-15 13:50:03 By: milo |
| CISA Adds Actively Exploited Sierra Router Flaw to KEV Catalog | 0 user ratings | 2025-12-15 07:15:07 By: milo |
| CISA Alerts on Actively Exploited Google Chromium Zero-Day Flaw | 0 user ratings | 2025-12-15 07:15:07 By: milo |
| Windows Remote Access Connection Manager Flaw Allows Arbitrary Code Execution | 0 user ratings | 2025-12-15 07:15:07 By: milo |
| Gentlemen Ransomware Emerges as a Threat to Corporate Networks | 0 user ratings | 2025-12-15 07:15:06 By: milo |
| Critical Plesk Vulnerability Allows Users to Gain Root-Level Access | 0 user ratings | 2025-12-15 07:15:06 By: milo |
| Critical pgAdmin Flaw Allows Attackers to Execute Shell Commands on Host | 0 user ratings | 2025-12-15 07:15:06 By: milo |
| New VolkLocker Ransomware Variant Targets Both Linux and Windows Systems | 0 user ratings | 2025-12-15 07:15:05 By: milo |
| NVIDIA Merlin Vulnerabilities Allows Malicious Code Execution and DoS Attacks | 0 user ratings | 2025-12-15 07:15:05 By: milo |
| Storm-0249: EDR Process Sideloading to Conceal Malicious Activity | 0 user ratings | 2025-12-15 07:15:05 By: milo |
| Hackers Launch Rust-Based Luca Stealer Targeting Linux and Windows | 0 user ratings | 2025-12-13 19:15:05 By: milo |
| Apple Confirms Zero-Day Exploitation in Targeted Attacks on iPhone Users | 0 user ratings | 2025-12-13 19:15:04 By: milo |
| Kali Linux 2025.4 Released Featuring 3 New Hacking Tools and Wifipumpkin3 | 0 user ratings | 2025-12-13 19:15:04 By: milo |
| Empire 6.3.0 Released as Updated Post-Exploitation Framework for Red Teams | 0 user ratings | 2025-12-13 19:15:04 By: milo |
| Researchers and Developers Targeted in AI-Driven GitHub Supply Chain Attack | 0 user ratings | 2025-12-13 19:15:03 By: milo |
| Password Cracking: Getting Started with John the Ripper | 0 user ratings | 2025-12-13 14:57:16 By: milo |
| Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files | 0 user ratings | 2025-12-13 07:13:43 By: milo |
| Metasploit Wrap-Up 12 12 2025 | 0 user ratings | 2025-12-12 21:27:19 By: milo |
| ConsentFix Attack Lets Hackers Hijack Microsoft Accounts via Azure CLI Abuse | 0 user ratings | 2025-12-12 17:36:05 By: milo |
| New AiTM Attack Campaign Bypasses MFA to Target Microsoft 365 and Okta Users | 0 user ratings | 2025-12-12 17:36:05 By: milo |
| Researchers Revive 2000s ‘Blinkenlights’ to Extract Smartwatch Firmware via Screen Pixels | 0 user ratings | 2025-12-12 17:36:04 By: milo |
| 10,000+ Docker Hub Images Exposed with Live Production Credentials from 100+ Firms | 0 user ratings | 2025-12-12 17:36:04 By: milo |
| CISA Issues New Guidance for Securing UEFI Secure Boot on Enterprise Devices | 0 user ratings | 2025-12-12 17:36:04 By: milo |
| CISA Alerts on Active Exploitation of Windows Cloud Files Mini Filter 0-Day | 0 user ratings | 2025-12-12 17:36:04 By: milo |
| MITRE Unveils 2025 s Top 25 Most Dangerous Software Weaknesses | 0 user ratings | 2025-12-12 17:36:03 By: milo |