News

Cybersecurity researchers have discovered a security flaw in Microsoft's OneDrive File Picker that, if successfully exploited ...
PumaBot hijacks Linux IoT devices via SSH brute-force, fakes Redis services, and mines crypto using stealthy rootkits.
Session hijacking now drives enterprise breaches—88% involve stolen credentials, often exploited within hours.
Mimo exploits CVE-2025-32432 in Craft CMS days after disclosure, deploying cryptominer and proxyware for monetization.
The attack works by targeting session tokens. This enables the attackers to subvert even multi-factor authentication (MFA); ...
Amazon-hosted IPs scanned 75 tech targets on May 8 in a one-day exploit surge, showing orchestrated cloud-based recon.
Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more ...
Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a ...