Posts | Rating | new post |
| Threat Actors Test a Highly Obfuscated, Modified Variant of the Shai Hulud Malware | 0 user ratings | 2026-01-02 13:58:03 By: milo |
| Cardano Users Warned of Possible Phishing Attempt Posing as Eternl Desktop Update | 0 user ratings | 2026-01-02 13:58:02 By: milo |
| GNU Wget2 Vulnerability Enables Remote File Overwrite Attacks | 0 user ratings | 2026-01-02 13:58:02 By: milo |
| Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach | 0 user ratings | 2026-01-02 13:58:01 By: milo |
| Google Tasks Feature Exploited in New Sophisticated Phishing Campaign | 0 user ratings | 2026-01-02 13:58:01 By: milo |
| Hacker Group Claims Responsibility for Alleged Tokyo FM Broadcasting Breach | 0 user ratings | 2026-01-02 13:58:01 By: milo |
| RondoDoX Botnet Abuses React2Shell Vulnerability for Malware Deployment | 0 user ratings | 2026-01-02 13:58:01 By: milo |
| Handala Hackers Breach Telegram Accounts Linked to Israeli Officials | 0 user ratings | 2026-01-02 13:58:00 By: milo |
| That Viral TikTok Airplane Sleep Hack May Come With Serious Safety Risks - Travel Noire | 0 user ratings | 2026-01-02 12:48:07 By: milo |
| Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques | 0 user ratings | 2026-01-02 05:32:29 By: milo |
| Apache NuttX Flaw Allows Attackers to Crash Embedded Systems | 0 user ratings | 2026-01-02 05:32:28 By: milo |
| Open Source Intelligence (OSINT): Tools and Techniques for Vehicle Investigation, Part 1 | 0 user ratings | 2025-12-31 17:48:47 By: milo |
| Critical Apache StreamPipes Flaw Allows Attackers to Take Over Admin Accounts | 0 user ratings | 2025-12-31 17:29:32 By: milo |
| APT36 Targets Indian Government Systems Using Malicious Windows LNK Files | 0 user ratings | 2025-12-31 17:29:32 By: milo |
| Two U.S. Cybersecurity Professionals Plead Guilty to Acting as ALPHV BlackCat Affiliates | 0 user ratings | 2025-12-31 17:29:31 By: milo |
| DarkSpectre Malware Campaign Hits Chrome, Edge, and Firefox Users | 0 user ratings | 2025-12-31 17:29:31 By: milo |
| Malicious Manipulation of LLMs for Scalable Vulnerability Exploitation | 0 user ratings | 2025-12-31 17:29:31 By: milo |
| GlassWorm Malware Turns VS Code Extensions into an Attack Vector Against macOS | 0 user ratings | 2025-12-31 17:29:30 By: milo |
| NeuroSploit v2 Launches as AI-Powered Penetration Testing Framework | 0 user ratings | 2025-12-31 17:29:30 By: milo |
| New Cybercrime Tool ErrTraffic Enables Automated ClickFix Attacks | 0 user ratings | 2025-12-31 17:29:30 By: milo |
| New Open-Source C2 Framework AdaptixC2 Debuts With Improved Stability and Speed | 0 user ratings | 2025-12-31 05:37:35 By: milo |
| New AI-Enhanced Crypter Promoted as Capable of Evading Windows Defender | 0 user ratings | 2025-12-31 05:37:35 By: milo |
| Chinese Hackers Deploy Rootkit to Stealthily Mask ToneShell Malware | 0 user ratings | 2025-12-30 17:31:40 By: milo |
| Hackers Abuse Copilot Studio s New Connected Agents Feature to Plant Backdoors | 0 user ratings | 2025-12-30 17:31:39 By: milo |
| CISA Alerts on Active Exploitation of MongoDB Vulnerability CVE-2025-14847 | 0 user ratings | 2025-12-30 17:31:39 By: milo |