New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy
Thu, 15 May 2025 16:13:00 +0530
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers
Thu, 15 May 2025 15:35:00 +0530
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper
Thu, 15 May 2025 15:30:00 +0530
Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit
Wed, 14 May 2025 23:27:00 +0530
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan
Wed, 14 May 2025 23:20:00 +0530
Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering
Wed, 14 May 2025 20:57:00 +0530
CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users
Wed, 14 May 2025 19:35:00 +0530
Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns
Wed, 14 May 2025 16:41:00 +0530
Learning How to Hack: Why Offensive Security Training Benefits Your Entire Security Team
Wed, 14 May 2025 16:24:00 +0530
Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails
Wed, 14 May 2025 16:10:00 +0530
Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server
Wed, 14 May 2025 13:44:00 +0530
Fortinet Patches CVE-2025-32756 Zero-Day RCE Flaw Exploited in FortiVoice Systems
Wed, 14 May 2025 09:51:00 +0530
Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks
Wed, 14 May 2025 09:30:00 +0530
China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide
Tue, 13 May 2025 20:43:00 +0530
Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads
Tue, 13 May 2025 20:17:00 +0530
North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress
Tue, 13 May 2025 16:27:00 +0530
Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
Tue, 13 May 2025 12:03:00 +0530
Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
Tue, 13 May 2025 10:38:00 +0530
ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
Mon, 12 May 2025 19:33:00 +0530
⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
Mon, 12 May 2025 17:40:00 +0530
The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That
Mon, 12 May 2025 16:30:00 +0530
Share this story
Industry 4.0, the Fourth Industrial Revolution, and 4IR.
LEARN MOREThe key features and benefits of Endpoint Detection and Response (EDR).
LEARN MOREGoogle's global exhibition of inspiration, innovation, and education
LEARN MOREExplore how cutting-edge technologies empower business at the AWS Summit.
LEARN MORELeverage trends, strategies, and predictions to give your business a competitive edge.
LEARN MOREHow to scale from VMs to Kubernetes.
LEARN MORELet us know what you think about the article.