Storm-2603 group exploits SharePoint flaws and uses a custom C2 framework, AK47 C2, with HTTP- and DNS-based variants named AK47HTTP…
CISA releases Thorium, an open-source tool for malware and forensic analysis, now available to analysts in government, public, and private…
Russia-linked Secret Blizzard targets foreign embassies in Moscow via ISP-level AitM attacks, deploying custom ApolloShadow malware. Microsoft researchers uncovered a…
Hackers exploit a critical vulnerability, tracked as CVE-2025-5394 (CVSS score of 9.8), in the Alone WordPress theme to hijack sites.…
Critical flaws in Dahua cameras let hackers take control remotely. The vendor has released patches, users should update firmware asap.…
Apple addressed a high-severity vulnerability that has been exploited in zero-day attacks targeting Google Chrome users. Apple released security updates…
PyPI warns of phishing emails from noreply@pypj[.]org posing as "[PyPI] Email verification" to redirect users to fake package sites. PyPI…
Hackers exploited a SAP NetWeaver bug to deploy upgraded Auto-Color Linux malware in an attack on U.S. chemicals firm. Cybersecurity…
Orange, France’s largest telecom provider, reported a cyberattack on one of its internal systems, impacting its operations in Europe and…
The dating safety app Tea was hacked, leaking images, posts, and comments of thousands of users who shared anonymous "red…
This website uses cookies.