Cybersecurity News

New Sophisticated Malware CoffeeLoader Bypasses Endpoin...

Cybersecurity researchers have uncovered a sophisticated new malware strain targ...

New macOS Malware ‘ReaderUpdate’ Upgraded Arsenal With ...

A sophisticated macOS malware loader platform known as “ReaderUpdate” has signif...

Classiscam Actors Automate Malicious Websites To Steal ...

Online marketplaces have become increasingly popular in developing countries sin...

Threat Actors Using Powerful Cybercriminal Weapon ‘Atla...

Credential stuffing has emerged as one of the most pervasive and effective attac...

Synology Mail Server Let Remote Attackers Tamper System...

A moderate-severity vulnerability has been identified in Synology Mail Server. I...

NSW Online Registry Website Breach – 9,000+ Files Stole...

In a significant cybersecurity incident, approximately 9,000 sensitive court doc...

CISA Adds Sitecore CMS Code Execution Vulnerability to ...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has officially ...

Hackers Abuse COM Objects for Fileless Malware Lateral ...

A sophisticated technique was recently detected by researchers where attackers a...

B1ack’s Stash MarketPlace Actors to Release 4 Million S...

Dark web carding marketplace B1ack’s Stash has announced the release of 4 millio...

PoC Exploit Released for Ingress-NGINX Remote Code Exec...

A proof-of-concept (PoC) exploit for a critical remote code execution vulnerabil...

OpenAI Offering Up to $100,000 for Critical Vulnerabili...

OpenAI has dramatically increased its maximum bug bounty reward to $100,000 for ...

New Sophisticated Linux-Backdoor Attacking OT Systems E...

A sophisticated Linux-based backdoor dubbed “OrpaCrab” has emerged as a signific...

CodeQLEAKED – GitHub Supply Chain Attack Allows Code Ex...

A significant vulnerability in GitHub’s CodeQL actions could have permitted atta...

Exim Use-After-Free Vulnerability Allows Privilege Esca...

A critical security vulnerability has been identified in the widely used Exim ma...

12 Cybercriminals Arrested Following Takedown of Ghost ...

Irish and Spanish law enforcement authorities have successfully apprehended 12 m...

Splunk RCE Vulnerability Let Attackers Execute Arbitrar...

Splunk has released patches to address a high-severity Remote Code Execution (RC...

Production Line Cameras Vulnerabilities Let Attackers S...

Critical security vulnerabilities have been identified in industrial camera syst...

SectopRAT as Weaponized Cloudflare Turnstile Challenge ...

A sophisticated new malware strain dubbed SectopRAT has emerged, leveraging Clou...

Top 3 Cyber Attacks In March 2025

March 2025 saw a sharp uptick in cyber threats that put both individual users an...

YouTube Creators Under Attack via Brand Collaborators R...

A sophisticated phishing campaign dubbed the “Clickflix Technique” has emerged t...

New NPM Attack Infecting Local Packages With Cleverly H...

The NPM package repository remains active, and despite a decline in malware numb...

3 in 4 Enterprise Users Upload Data to GenAI Including ...

In a startling revelation, a new report indicates that three out of four enterpr...

CrushFTP HTTPS Port Vulnerability Leads to Unauthorized...

Two critical vulnerabilities have been identified in widely used software: Crush...

Operation ForumTroll – APT Hackers Exploit Google Chrom...

In mid-March 2025, cybersecurity researchers uncovered “Operation ForumTroll,” t...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.