Posts | Rating | new post |
New Veeam-Themed Phishing Attack Uses Weaponized WAV File to Target Users | 0 user ratings | 2025-07-18 19:47:00 By: milo |
Lumma Infostealer Steals Browser Data and Sells It as Logs on Underground Markets | 0 user ratings | 2025-07-18 19:21:58 By: milo |
New Surge of Crypto-Jacking Hits Over 3,500 Websites | 0 user ratings | 2025-07-18 18:58:42 By: milo |
Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools | 0 user ratings | 2025-07-18 18:26:03 By: milo |
Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials | 0 user ratings | 2025-07-18 18:01:55 By: milo |
PoisonSeed Tricking Users Into Bypassing FIDO Keys With QR Codes | 0 user ratings | 2025-07-18 17:24:52 By: milo |
Wi-Fi Hacking: Dragonblood Attacks against WPA3 | 0 user ratings | 2025-07-18 16:33:26 By: milo |
In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass - SecurityWeek | 0 user ratings | 2025-07-18 15:29:02 By: milo |
New QR Code Attacks Through PDFs Bypass Detection and Steal Credentials | 0 user ratings | 2025-07-18 13:09:16 By: milo |
Sophos Intercept X for Windows Flaws Enable Arbitrary Code Execution | 0 user ratings | 2025-07-18 12:53:18 By: milo |
Google Sues BadBox 2.0 Botnet Operators Behind 10 Million+ Infected Devices | 0 user ratings | 2025-07-18 12:45:08 By: milo |
Grafana Flaws Allow User Redirection and Code Execution in Dashboards | 0 user ratings | 2025-07-18 12:36:42 By: milo |
Ubiquiti UniFi Vulnerability Lets Hackers Inject Malicious Commands | 0 user ratings | 2025-07-18 12:20:04 By: milo |
Microsoft Defender for Office 365 Gets Enhanced Threat Dashboard | 0 user ratings | 2025-07-18 12:12:53 By: milo |
Livestream of RoboCup2025 | 0 user ratings | 2025-07-18 11:39:04 By: milo |
Years Long Linux Cryptominer Spotted Using Legit Sites to Spread Malware | 0 user ratings | 2025-07-18 11:12:10 By: milo |
Threat Actors Exploit Ivanti Connect Secure Flaws to Deploy Cobalt Strike Beacon | 0 user ratings | 2025-07-18 11:08:17 By: milo |
Hackers Exploit ClickFix Tactics to Spread NetSupport RAT, Latrodectus, and Lumma Stealer | 0 user ratings | 2025-07-18 10:12:38 By: milo |
Lenovo Protection Driver Flaw Enables Privilege Escalation and Code Execution | 0 user ratings | 2025-07-18 09:57:47 By: milo |
WAFFLED: New Technique Targets Web Application Firewall Weaknesses | 0 user ratings | 2025-07-18 09:43:10 By: milo |
Microsoft Uncovers Scattered Spider Tactics, Techniques, and Procedures in Recent Attacks | 0 user ratings | 2025-07-18 09:43:09 By: milo |
Signal App Clone Telemessage App Vulnerability Actively Exploited for Password Theft | 0 user ratings | 2025-07-18 09:28:14 By: milo |
Threat Actors Exploit GitHub Accounts to Host Payloads, Tools, and Amadey Malware Plugins | 0 user ratings | 2025-07-18 09:12:38 By: milo |
10 Best XDR (Extended Detection And Response) Solutions 2025 | 0 user ratings | 2025-07-18 08:13:13 By: milo |
Russian Vodka Maker Beluga Struck by Ransomware Attack | 0 user ratings | 2025-07-18 08:13:12 By: milo |