Cybersecurity Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks by Cyber Security August 12, 2025 1.3k
Cybersecurity WinRAR zero-day exploited in espionage attacks against high-value targets August 12, 2025 1.3k
Cybersecurity WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately August 11, 2025 1.3k
Cybersecurity Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models August 10, 2025 1.3k
Cybersecurity Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install August 9, 2025 1.3k
Cybersecurity Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised April 28, 2025 1.3k
Cybersecurity Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers April 27, 2025 1.3k
Cybersecurity Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers April 25, 2025 1.3k
Cybersecurity Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools April 24, 2025 1.3k
Cybersecurity Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals April 24, 2025 1.3k
Cybersecurity Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely April 24, 2025 1.3k
Cybersecurity WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads April 24, 2025 1.4k
Cybersecurity Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp April 23, 2025 1.3k
Cybersecurity Ripple’s xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack April 23, 2025 1.3k
Cybersecurity Google Drops Cookie Prompt in Chrome, Adds IP Protection to Incognito April 23, 2025 1.3k
Cybersecurity Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach April 22, 2025 1.3k
Cybersecurity Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan April 21, 2025 1.3k
Cybersecurity APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures April 20, 2025 1.3k
Cybersecurity Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems April 19, 2025 1.3k
Cybersecurity [Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach April 18, 2025 1.3k
Cybersecurity Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution April 17, 2025 1.3k
Cybersecurity CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices April 17, 2025 1.3k
Cybersecurity Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks April 17, 2025 1.3k
Cybersecurity New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks April 16, 2025 1.3k
Cybersecurity U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert April 16, 2025 1.3k
Cybersecurity Malicious PyPI Package Targets MEXC Trading API to Steal Credentials and Redirect Orders April 15, 2025 1.3k
Cybersecurity Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence April 15, 2025 1.3k
Cybersecurity Meta Resumes E.U. AI Training Using Public User Data After Regulator Approval April 15, 2025 1.3k
Cybersecurity Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability April 15, 2025 1.3k