Posts | Rating | new post |
| Threat Actors Use JSON Storage for Hosting and Delivering Malware via Trojanized Code | 0 user ratings | 2025-11-13 13:40:44 By: milo |
| Hackers Infiltrate npm Registry with 43,000 Spam Packages, Linger for Nearly Two Years | 0 user ratings | 2025-11-13 13:21:41 By: milo |
| OpenAI Sora 2 Vulnerability Allows Exposure of Hidden System Prompts from Audio Data | 0 user ratings | 2025-11-13 13:12:29 By: milo |
| CISA Warns of Active Exploitation of Windows Kernel 0-Day Enabling Privilege Escalation | 0 user ratings | 2025-11-13 12:35:55 By: milo |
| Operation Endgame: Authorities Takedown 1,025 Servers Linked to Rhadamanthys, VenomRAT, and Elysium | 0 user ratings | 2025-11-13 10:45:05 By: milo |
| Kibana Vulnerabilities Expose Systems to SSRF and XSS Attacks | 0 user ratings | 2025-11-13 10:07:47 By: milo |
| Malicious Chrome Extension Grants Full Control Over Ethereum Wallet | 0 user ratings | 2025-11-13 09:30:42 By: milo |
| GitLab Vulnerabilities Expose Users to Prompt Injection Attacks and Data Theft | 0 user ratings | 2025-11-13 09:13:00 By: milo |
| New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware | 0 user ratings | 2025-11-13 08:26:40 By: milo |
| Critical Dell Data Lakehouse Flaw Allows Remote Attackers to Escalate Privileges | 0 user ratings | 2025-11-13 07:21:38 By: milo |
| Advanced hacker seen exploiting Cisco, Citrix zero-days - The Record from Recorded Future News | 0 user ratings | 2025-11-13 06:26:38 By: milo |
| Beware of Fake Bitcoin Tools Concealing DarkComet RAT Malware | 0 user ratings | 2025-11-13 06:09:02 By: milo |
| CISA Warns of Active Exploitation of WatchGuard Firebox Out-of-Bounds Write Flaw | 0 user ratings | 2025-11-13 05:58:57 By: milo |
| Citrix NetScaler ADC and Gateway Flaw Allows Cross-Site Scripting (XSS) Attacks | 0 user ratings | 2025-11-13 05:50:09 By: milo |
| Hackers Using RMM Tools LogMeIn and PDQ Connect to Deploy Malware as Legitimate Software | 0 user ratings | 2025-11-13 05:40:39 By: milo |
| Active Exploitation of Cisco and Citrix 0-Day Vulnerabilities Allows Webshell Deployment | 0 user ratings | 2025-11-13 05:31:18 By: milo |
| Google Sues Lighthouse Over Massive Phishing Attacks | 0 user ratings | 2025-11-13 05:02:42 By: milo |
| Digital Forensics: Investigating a Cyberattack with Autopsy | 0 user ratings | 2025-11-12 14:34:34 By: milo |
| AppleScript Used to Deliver macOS Malware Disguised as Zoom & Teams Updates | 0 user ratings | 2025-11-12 13:06:03 By: milo |
| SecureVibes Introduces Multi-Language Vulnerability Scanner Powered by Claude AI | 0 user ratings | 2025-11-12 12:55:36 By: milo |
| MastaStealer Exploits Windows LNK to Launch PowerShell and Bypass Defender | 0 user ratings | 2025-11-12 12:15:21 By: milo |
| Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool | 0 user ratings | 2025-11-12 11:49:49 By: milo |
| Hackers Exploit SSRF Flaw in Custom GPTs to Steal ChatGPT Secrets | 0 user ratings | 2025-11-12 11:39:05 By: milo |
| Rhadamanthys Stealer Servers Reportedly Seized; Admin Urges Immediate Reinstallation | 0 user ratings | 2025-11-12 11:19:07 By: milo |
| Authentication Coercion: How Windows Machines Are Tricked into Leaking Credentials | 0 user ratings | 2025-11-12 10:50:22 By: milo |