U.S. CISA adds a flaw in n8n to its Known Exploited Vulnerabilities catalog

4 weeks ago

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in n8n to its Known Exploited Vulnerabilities catalog. The…

Bell Ambulance data breach impacted over 238,000 people

4 weeks ago

Bell Ambulance confirms a February 2025 breach affecting 238,000 people, exposing personal, financial, and health information. Nearly 238,000 individuals are…

<gwmw style="display: none; background-color: transparent;"></gwmw>Pro-Palestinian hacktivist group Handala targets Stryker in global disruption<gwmw style="display: none; background-color: transparent;"></gwmw>

4 weeks ago

Pro-Palestinian hacktivist group Handala claims a cyberattack on Stryker, alleging it wiped 200,000 systems and disrupted global operations. Pro-Palestinian hacktivist…

BeatBanker malware targets Android users with banking Trojan and crypto miner

4 weeks ago

BeatBanker Android malware spreads through fake Starlink apps on websites imitating Google Play Store, hijacking devices, stealing credentials, and mining…

Hewlett Packard Enterprise fixes critical authentication bypass in Aruba AOS-CX

4 weeks ago

Hewlett Packard Enterprise (HPE) fixed several flaws in Aruba AOS-CX, including a critical bug that lets attackers reset admin passwords.…

KadNap bot compromises 14,000+ devices to route malicious traffic

4 weeks ago

KadNap malware infects 14,000+ edge devices, mainly Asus routers, turning them into a stealth proxy botnet used to route malicious…

Microsoft Patch Tuesday security updates for March 2026 fixed 84 bugs

4 weeks ago

Microsoft Patch Tuesday security updates for March 2026 addressed 84 vulnerabilities in its products. None of the flaws are known…

Attackers exploit FortiGate devices to access sensitive network information

4 weeks ago

Attackers are exploiting FortiGate devices to breach networks and steal configuration data containing service account credentials and network details. SentinelOne…

APT28 conducts long-term espionage on Ukrainian forces using custom malware

4 weeks ago

APT28 used BEARDSHELL and COVENANT malware to spy on Ukrainian military personnel, enabling long-term surveillance since April 2024. The Russia-linked…

Threat actors use custom AuraInspector to harvest data from Salesforce systems

4 weeks ago

Attackers are mass-scanning Salesforce Experience Cloud sites using a modified AuraInspector tool to exploit misconfigurations and access sensitive data. Salesforce…

This website uses cookies.