Microsoft Outlook Vulnerability Let Attackers Execute Arbitrary Code Remotely13 hours agoBy Guru BaranMore
Fortinet OS Command Injection Vulnerability Lets Attackers Execute Unauthorised Code on FortiAnalyzer-CloudYesterdayMore
FIN6 Hackers Mimic as Job Seekers to Target Recruiters with Weaponized Resumes2 hours agoBy Tushar Subhra DuttaMore
Microsoft Defender XDR New Advanced Hunting Tables for Email and Cloud Protections8 hours agoBy Guru BaranMore
Multiple Chrome Vulnerabilities Allow Attackers to Execute Malicious Code Remotely14 hours agoBy Guru BaranMore
Indian Authorities Dismantled Cybercriminals That Impersonate as Microsoft Tech Support22 hours agoBy Tushar Subhra DuttaMore
New Secure Boot Bypass Vulnerability Let Attackers Install Malware in PCs and Servers Boot Process4 hours agoBy Tushar Subhra DuttaMore
Microsoft Patch Tuesday June 2025 - Exploited zero-day and Other 65 Vulnerabilities PatchedYesterdayBy Guru BaranMore
Microsoft Teams New Audit log Feature Allows Admins to Track Individuals Actions8 hours agoBy Guru BaranMore
Salesforce OmniStudio Vulnerabilities Exposes Sensitive Customer Data in Plain Text9 hours agoBy Tushar Subhra DuttaMore
Windows Remote Desktop Services Vulnerability Allows Remote Code Execution9 hours agoBy Guru BaranMore
SAP June 2025 Patch Day - 14 Vulnerabilities Patched Across Multiple ProductsYesterdayBy Guru BaranMore
Microsoft to Block Attachments in Outlook Web & Windows Used by Threat Actors6 hours agoBy Guru BaranMore
Linux Malware Authors Attacking Cloud Environments Using ELF Binaries3 hours agoBy Tushar Subhra DuttaMore
Critical Vulnerability in Lovable's Security Policies Let Attackers Inject Malicious CodeYesterdayBy Guru BaranMore
'Librarian Ghouls' APT Group Actively Attacking Organizations To Deploy MalwareYesterdayBy Tushar Subhra DuttaMore
Beware of Instagram Growth That Steals User Login Credentials & Send to Attacker Server20 hours agoBy Tushar Subhra DuttaMore
Operation Secure: 20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled3 hours agoBy Guru BaranMore
DanaBot Malware C2 server Vulnerability Exposes Threat Actor Usernames & Crypto KeysYesterdayBy Tushar Subhra DuttaMore
ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code InjectionYesterdayBy Guru BaranMore
New DuplexSpy RAT Let Attackers Gain Complete Control of Windows Machine2 days agoBy Tushar Subhra DuttaMore
Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks2 days agoBy Tushar Subhra DuttaMore
Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight2 days agoBy Tushar Subhra DuttaMore
New Report Warns of Internet is The Top Threat Source for Industrial Automation Systems19 hours agoBy Tushar Subhra DuttaMore
Ivanti Workspace Control Vulnerabilities Let Attackers Decrypt Stored SQL CredentialsYesterdayBy Guru BaranMore
40,000+ Internet-connected Cameras Exposed Streaming Live on The Internet5 hours agoBy Tushar Subhra DuttaMore
Sophisticated Skitnet Malware Actively Adopted by Ransomware Gangs to Streamline Operations2 days agoBy Tushar Subhra DuttaMore
APT41 Hackers Using Google Calendar for Malware Command-and-Control To Attack Government Entities2 days agoBy Tushar Subhra DuttaMore
New Blitz Malware Attacking Windows Servers to Deploy Monero Miner2 days agoBy Tushar Subhra DuttaMore