Posts | Rating | new post |
| JA3 Fingerprinting Tool Exposes Attackers’ Infrastructure | 0 user ratings | 2026-01-22 14:42:32 By: milo |
| Cisco Unified CM Zero-Day RCE Under Attack, CISA Issues Warning | 0 user ratings | 2026-01-22 14:42:32 By: milo |
| Hackers Exploit Snap Domains to Inject Malicious Code into Linux Software Packages | 0 user ratings | 2026-01-22 14:42:32 By: milo |
| PNB MetLife Phishing Attack: Multi-Stage Scheme Steals Data, Triggers UPI Payments | 0 user ratings | 2026-01-22 14:42:31 By: milo |
| BIND 9 Flaw Lets Attackers Crash Servers With Malicious DNS Records | 0 user ratings | 2026-01-22 14:42:31 By: milo |
| NVIDIA CUDA Toolkit Flaw Allows Command Injection, Arbitrary Code Execution | 0 user ratings | 2026-01-22 14:42:30 By: milo |
| Critical Vivotek Flaw Enables Remote Arbitrary Code Execution | 0 user ratings | 2026-01-22 14:42:30 By: milo |
| New Osiris Ransomware Leverages Living Off the Land and Dual-Use Tools in Attacks | 0 user ratings | 2026-01-22 14:42:30 By: milo |
| Crypto Hack: Layer-1 Protocol Saga Halts EVM Chain After $7M Exploit - CoinGape | 0 user ratings | 2026-01-22 13:56:04 By: milo |
| ClearFake malware Exploits Proxy Execution to Run Malicious PowerShell Commands via Trusted Windows Feature | 0 user ratings | 2026-01-22 10:06:33 By: milo |
| New AI-Powered Android Malware Automatically Clicks Ads on Infected Devices | 0 user ratings | 2026-01-22 10:06:33 By: milo |
| New ClickFix Campaign Exploits Fake Verification Pages to Hijack Facebook Sessions | 0 user ratings | 2026-01-22 10:06:32 By: milo |
| Malicious PyPI Package Impersonates sympy-dev, Targeting Millions of Users | 0 user ratings | 2026-01-22 10:06:32 By: milo |
| New Multi-Stage Windows Malware Disables Microsoft Defender, Deploys Malicious Payloads | 0 user ratings | 2026-01-22 10:06:32 By: milo |
| Active Exploitation Of Fortinet SSO Flaw Targets Firewalls For Admin Takeover | 0 user ratings | 2026-01-22 10:06:31 By: milo |
| Cisco Unified Communications Zero-Day RCE Flaw Actively Exploited For Root Shell Access | 0 user ratings | 2026-01-22 10:06:31 By: milo |
| Researchers Expose LockBit 5.0 Affiliate Panel and New Encryption Variants | 0 user ratings | 2026-01-22 01:29:31 By: milo |
| I used GPT-5.2-Codex to find a mystery bug and hosting nightmare - it was beyond fast | 0 user ratings | 2026-01-21 20:45:06 By: milo |
| SCADA (ICS) Hacking and Security: Hacking Nuclear Power Plants, Part 1 | 0 user ratings | 2026-01-21 17:10:13 By: milo |
| Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes | 0 user ratings | 2026-01-21 14:19:27 By: milo |
| Magecart Hack Injects JavaScript to Steal Online Payment Data | 0 user ratings | 2026-01-21 13:24:33 By: milo |
| PURELOGS Payload Hidden in Weaponized PNG Images Used in Stealth Attacks | 0 user ratings | 2026-01-21 13:24:33 By: milo |
| Weaponized Shipping Documents Spread Remcos RAT in Stealthy Malware Campaign | 0 user ratings | 2026-01-21 13:24:33 By: milo |
| GNU InetUtils Vulnerability Exploited via -f root to Achieve Full System Control | 0 user ratings | 2026-01-21 13:24:32 By: milo |
| Critical Zoom Vulnerability Enables Remote Code Execution via Command Injection | 0 user ratings | 2026-01-21 13:24:32 By: milo |