Posts | Rating | new post |
| VoidLink Framework Introduces On-Demand Tool Generation with Native Windows Plugin Support | 0 user ratings | 2026-02-11 12:35:28 By: milo |
| MSHTML Framework Zero-Day Opens Door to Network-Based Security Bypass | 0 user ratings | 2026-02-11 12:35:28 By: milo |
| Microsoft Office Word 0-Day Vulnerability Enables Attackers to Bypass Security Feature | 0 user ratings | 2026-02-11 11:55:29 By: milo |
| Desktop Window Manager Zero-Day Enables Privilege Escalation | 0 user ratings | 2026-02-11 11:25:29 By: milo |
| GTIG Warns of Rising Espionage and Supply Chain Cyber Threats Targeting Defense Sector | 0 user ratings | 2026-02-11 11:15:28 By: milo |
| RU-APT-ChainReaver-L Hijacks Trusted Sites and GitHub in Sweeping Cross-Platform Supply Chain Attack | 0 user ratings | 2026-02-11 09:44:28 By: milo |
| Ivanti Endpoint Manager Flaw Enables Remote Data Exposure | 0 user ratings | 2026-02-11 09:14:28 By: milo |
| Windows Remote Access Connection Manager Zero-Day Enables DoS Attacks | 0 user ratings | 2026-02-11 07:24:29 By: milo |
| Hackers Exploit ChatGPT, Grok and Google Ads to Spread macOS AMOS Stealer | 0 user ratings | 2026-02-11 07:24:28 By: milo |
| Windows Shell Zero-Day Vulnerability Allows Attackers to Bypass Authentication | 0 user ratings | 2026-02-11 07:24:28 By: milo |
| Legacy IRC Botnet Leverages Automated SSH Exploit Pipeline to Mass-Enroll Linux Hosts | 0 user ratings | 2026-02-11 07:04:28 By: milo |
| Cephalus Ransomware Emerges as Go-Based Double-Extortion Threat Exploiting Exposed RDP Access | 0 user ratings | 2026-02-11 06:34:28 By: milo |
| FortiOS Vulnerability Enables LDAP Authentication Bypass | 0 user ratings | 2026-02-11 06:34:27 By: milo |
| GitLab Patches Multiple Vulnerabilities Enabling DoS and Cross-Site Scripting Attacks | 0 user ratings | 2026-02-11 05:24:28 By: milo |
| Coinbase Cartel Shifts to Data-Theft-First Tactics, Targeting High-Value Industries | 0 user ratings | 2026-02-11 05:04:28 By: milo |
| Microsoft Patch Tuesday February 2026 Fixes 54 Flaws, 6 Zero-Days Under Active Exploitation | 0 user ratings | 2026-02-11 04:54:28 By: milo |
| Patch Tuesday - February 2026 | 0 user ratings | 2026-02-11 02:20:12 By: milo |
| Tech Oversight Project: ahead of a landmark social media addiction trial, Meta paid for 3,500+ ads on CNN, Fox, and others to promote Instagram's | 0 user ratings | 2026-02-10 19:20:10 By: milo |
| Measuring AI Security: Separating Signal from Panic | 0 user ratings | 2026-02-10 18:19:11 By: milo |
| Long Range Acoustic Device (LRAD), Part 2: Tactics and Countermeasures | 0 user ratings | 2026-02-10 14:51:22 By: milo |
| Hackers Weaponize 7-Zip Downloads to Turn Home PCs Into Proxy Nodes | 0 user ratings | 2026-02-10 13:49:26 By: milo |
| React2Shell Vulnerability Exploited in the Wild, Analysts Warn | 0 user ratings | 2026-02-10 13:09:31 By: milo |
| SAP Security Patch Day Fixes Critical Code Injection Flaw in SAP CRM and S 4HANA | 0 user ratings | 2026-02-10 12:59:28 By: milo |
| TeamPCP Turns Cloud Misconfigurations Into a Self-Propagating Cybercrime Platform | 0 user ratings | 2026-02-10 12:59:28 By: milo |
| Socelars Malware Targets Windows Systems to Steal Sensitive Data | 0 user ratings | 2026-02-10 12:39:27 By: milo |