Cybersecurity Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads by Cyber Security May 13, 2025 1.3k
Cybersecurity China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide May 13, 2025 1.3k
Cybersecurity Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection May 10, 2025 1.3k
Cybersecurity Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business May 9, 2025 1.3k
Cybersecurity Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks February 5, 2025 1.3k
Cybersecurity Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts February 5, 2025 1.3k
Cybersecurity New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack February 5, 2025 1.3k
Cybersecurity Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access February 4, 2025 1.3k
Cybersecurity Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections February 4, 2025 1.3k
Cybersecurity AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access February 4, 2025 1.3k
Cybersecurity Microsoft SharePoint Connector Flaw Could’ve Enabled Credential Theft Across Power Platform February 3, 2025 1.3k
Cybersecurity 768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023 February 3, 2025 1.3k
Cybersecurity PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages February 3, 2025 1.3k
Cybersecurity BeyondTrust Zero-Day Breach Exposes 17 SaaS Customers via Compromised API Key February 1, 2025 1.3k
Cybersecurity Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists February 1, 2025 1.3k
Cybersecurity Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown January 30, 2025 1.3k
Cybersecurity Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer January 29, 2025 1.3k
Cybersecurity How Long Does It Take Hackers to Crack Modern Hashing Algorithms? January 28, 2025 1.3k
Cybersecurity Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More January 27, 2025 1.3k
Cybersecurity CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List January 24, 2025 1.3k