Posts | Rating | new post |
| TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanism | 0 user ratings | 2026-01-20 08:23:35 By: milo |
| Discord Exploited to Spread Clipboard Hijacker Stealing Cryptocurrency Funds | 0 user ratings | 2026-01-20 07:11:34 By: milo |
| SolyxImmortal Malware Abuses Discord to Quietly Harvest Sensitive Information | 0 user ratings | 2026-01-20 06:35:34 By: milo |
| WhisperPair Vulnerability Allows Attackers to Pair Devices Without User Consent | 0 user ratings | 2026-01-20 06:35:33 By: milo |
| Critical AVEVA Software Flaws Allow Remote Code Execution With SYSTEM Privileges | 0 user ratings | 2026-01-20 05:23:33 By: milo |
| Google Ads Exploited to Deliver TamperedChef Through Malicious PDF Editor | 0 user ratings | 2026-01-20 05:14:34 By: milo |
| Google Gemini Flaw Allows Access to Private Meeting Details Through Calendar Events | 0 user ratings | 2026-01-20 05:14:34 By: milo |
| Cloudflare Zero-Day Flaw Allows Attackers to Bypass Security and Access Any Host | 0 user ratings | 2026-01-20 04:56:33 By: milo |
| How I used GPT-5.2-Codex to solve a mystery bug and hosting nightmare - in under an hour | 0 user ratings | 2026-01-19 17:07:04 By: milo |
| Digital Forensics: Browser Fingerprinting, Part 2 – Audio and Cache-Based Tracking Methods | 0 user ratings | 2026-01-19 14:33:39 By: milo |
| Hacktivists hijacked Iran s state TV to air anti-regime messages and an appeal to protest from Reza Pahlavi - Security Affairs | 0 user ratings | 2026-01-19 14:22:59 By: milo |
| Visual Studio Code Abused in Sophisticated Multistage Malware Attacks | 0 user ratings | 2026-01-19 14:14:31 By: milo |
| Remcos RAT Campaign Uses Trojanized VeraCrypt Installers to Steal Credentials | 0 user ratings | 2026-01-19 13:41:30 By: milo |
| Pulsar RAT Abuses Memory-Only Execution and HVNC for Stealthy Remote Takeover | 0 user ratings | 2026-01-19 13:33:30 By: milo |
| Redmi Buds Vulnerability Could Allow Call Data Theft and Firmware Instability | 0 user ratings | 2026-01-19 13:25:34 By: milo |
| Spear-Phishing Campaign Leverages Google Ads to Distribute EndRAT Malware | 0 user ratings | 2026-01-19 13:25:34 By: milo |
| Cybercriminals Impersonate Malwarebytes to Steal User Credentials | 0 user ratings | 2026-01-19 13:25:33 By: milo |
| Attackers Rerouted Employee Pay Without Breaching IT Systems | 0 user ratings | 2026-01-19 13:25:33 By: milo |
| Attackers Abuse WSL2 to Operate Undetected on Windows Systems | 0 user ratings | 2026-01-19 13:25:33 By: milo |
| Unmasked by Leaks: The Hidden Backbone of a Ransomware Operation | 0 user ratings | 2026-01-19 13:25:32 By: milo |
| CIRO Confirms Data Breach Impacting 750,000 Canadian Investors | 0 user ratings | 2026-01-19 13:25:32 By: milo |
| Windows SMB Client Vulnerability Exposes Organizations to Full Active Directory Compromise | 0 user ratings | 2026-01-19 13:25:32 By: milo |
| Five Chrome Extensions Used to Hijack Enterprise HR and ERP Systems | 0 user ratings | 2026-01-19 09:13:26 By: milo |
| How Security Teams Use IP Location and DNS History In Cybercrime Investigation | 0 user ratings | 2026-01-19 08:30:26 By: milo |
| PDFSIDER Malware Actively Exploited to Evade Antivirus and EDR Defenses | 0 user ratings | 2026-01-19 08:13:27 By: milo |