PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution2 days agoBy Guru BaranMore
Google Vulnerability Let Attackers Access Any Google User's Phone Number22 hours agoBy Guru BaranMore
Indian Authorities Dismantled Cybercriminals That Impersonate as Microsoft Tech Support4 hours agoBy Tushar Subhra DuttaMore
Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide2 days agoBy Guru BaranMore
CISA Warns of Erlang/OTP SSH Server RCE Vulnerability Exploited in Attacks14 hours agoBy Guru BaranMore
DanaBot Malware C2 server Vulnerability Exposes Threat Actor Usernames & Crypto Keys14 hours agoBy Tushar Subhra DuttaMore
GhostVendors - Hackers Registered 4000+ Domains Mimic popular Major Brands2 days agoBy Guru BaranMore
ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code Injection11 hours agoBy Guru BaranMore
Microsoft Patch Tuesday June 2025 - Exploited zero-day and Other 65 Vulnerabilities Patched6 hours agoBy Guru BaranMore
SAP June 2025 Patch Day - 14 Vulnerabilities Patched Across Multiple Products16 hours agoBy Guru BaranMore
Fortinet OS Command Injection Vulnerability Lets Attackers Execute Unauthorised Code on FortiAnalyzer-Cloud9 hours agoMore
Critical Vulnerability in Lovable's Security Policies Let Attackers Inject Malicious Code12 hours agoBy Guru BaranMore
'Librarian Ghouls' APT Group Actively Attacking Organizations To Deploy Malware12 hours agoBy Tushar Subhra DuttaMore
Ivanti Workspace Control Vulnerabilities Let Attackers Decrypt Stored SQL Credentials9 hours agoBy Guru BaranMore
New DuplexSpy RAT Let Attackers Gain Complete Control of Windows Machine2 days agoBy Tushar Subhra DuttaMore
Beware of Instagram Growth That Steals User Login Credentials & Send to Attacker Server2 hours agoBy Tushar Subhra DuttaMore
Seraphic Security Unveils BrowserTotal™ - Free AI-Powered Browser Security Assessment For Enterprises2 days agoMore
Critical Wazuh Server RCE Vulnerability Exploited to Deploy Mirai Variants2 days agoBy Guru BaranMore
Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated AttacksYesterdayBy Tushar Subhra DuttaMore
Developers Beware! 16 React Native Packages With Million of Download Compromised Overnight2 days agoBy Tushar Subhra DuttaMore
Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection2 days agoMore
Triple Combo - Kimsuky Hackers Attack Facebook, Email, and Telegram Users2 days agoBy Tushar Subhra DuttaMore
Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram2 days agoBy Guru BaranMore
Sophisticated Skitnet Malware Actively Adopted by Ransomware Gangs to Streamline OperationsYesterdayBy Tushar Subhra DuttaMore
New Blitz Malware Attacking Windows Servers to Deploy Monero Miner2 days agoBy Tushar Subhra DuttaMore
Hackers Continue to Leverage ConnectWise ScreenConnect Tool to Deploy Malware4 hours agoBy Tushar Subhra DuttaMore
Threat Actors Leverage SoraAI Popularity & Github to Deliver Malware10 hours agoBy Tushar Subhra DuttaMore
New Report Warns of Internet is The Top Threat Source for Industrial Automation Systems1 hour agoBy Tushar Subhra DuttaMore
OpenAI Banned ChatGPT Accounts Used by Russian, Iranian, and Chinese Hackers2 days agoBy Guru BaranMore
FakeCaptcha Infrastructure HelloTDS Infects Millions of Devices With Malware2 days agoBy Tushar Subhra DuttaMore
APT41 Hackers Using Google Calendar for Malware Command-and-Control To Attack Government EntitiesYesterdayBy Tushar Subhra DuttaMore
Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login CredentialsYesterdayBy Tushar Subhra DuttaMore