Latest Cyber Security News

Latest Cyber Security Attacks

Hackers Exploit Blockchain Smart Contracts ...

Hackers Exploit Blockchain Smart Contracts to Distribute Malware Through Compromised WordPress Sites

UNC5142, a financially motivated threat actor, is using blockchain smart contr...

Critical GDI Vulnerability in Windows Rust ...

Critical GDI Vulnerability in Windows Rust Kernel Module Causes System Instability

A newly discovered vulnerability in Microsoft's Rust-based Graphics Device...

Fake Microsoft Support Scam Tricks Users in...

Fake Microsoft Support Scam Tricks Users into Giving Up Credentials

There is a new tech support scam that utilizes Microsoft's brand name to t...

Fake Microsoft Support Scam Tricks Users in...

Fake Microsoft Support Scam Tricks Users into Giving Up Credentials

There is a new tech support scam that utilizes Microsoft's brand name to t...

AI Used to Boost Cyberattacks and Create Ma...

AI Used to Boost Cyberattacks and Create Malware, Report Finds

Cybercriminals are increasingly using artificial intelligence to develop malwa...

VMware Workstation and Fusion 25H2 Update I...

VMware Workstation and Fusion 25H2 Update Introduces New Features and Expanded OS Compatibility

VMware has released Workstation 25H2 and Fusion 25H2, the latest versions of i...

Cisco IP Phone Bugs in CUCM-Registered Devi...

Cisco IP Phone Bugs in CUCM-Registered Devices Allow Remote DoS and XSS Threatening Network and Device Stability

Cisco has issued a security advisory highlighting multiple vulnerabilities in ...

Prosper Data Breach Exposes Personal Inform...

Prosper Data Breach Exposes Personal Information of 17.6 Million Users

Hackers have breached the systems of Prosper, a U.S.-based peer-to-peer lendin...

North Korea-Linked Hackers Exploit EtherHid...

North Korea-Linked Hackers Exploit EtherHiding Technique in Advanced Crypto Theft Campaign

A North Korea-linked hacking group has been detected using the EtherHiding tec...

Log Poisoning Attack Exploits phpMyAdmin to...

Log Poisoning Attack Exploits phpMyAdmin to Deliver Gh0st RAT

Huntress researchers discovered an advanced intrusion of chained log poisoning...

Critical Deno Vulnerability Enables Command...

Critical Deno Vulnerability Enables Command Injection via Batch Files on Windows

The Deno project has announced a new security advisory addressing a command in...

Akka.NET TLS Vulnerability Exposes Clusters...

Akka.NET TLS Vulnerability Exposes Clusters to Untrusted Access (CVE-2025-61778)

A critical vulnerability has been discovered in Akka.NET’s Akka.Remote modul...

Sotheby’s Confirms Data Breach Exposing C...

Sotheby’s Confirms Data Breach Exposing Customer Financial and Personal Information

Sotheby’s, one of the world’s leading auction houses, has disclosed a data...

Severe Samba Flaw Enables Unauthenticated A...

Severe Samba Flaw Enables Unauthenticated Attackers to Execute Commands Remotely

A critical vulnerability identified as CVE-2025-10230 has been discovered in S...

Windows Scheduled Tasks Used to Spread Vall...

Windows Scheduled Tasks Used to Spread ValleyRAT

A targeted espionage campaign has been observed using carefully tailored spear...

TP-Link AX1800 Media-Sharing Vulnerability ...

TP-Link AX1800 Media-Sharing Vulnerability Leads to Root Shell

Security researcher Rocco Calvi disclosed a critical vulnerability in TP-Link ...

Critical UEFI Shell Bug Exposes 200K Framew...

Critical UEFI Shell Bug Exposes 200K Framework Laptops to Secure Boot Bypass

Security experts have discovered severe vulnerabilities in Microsoft-signed UE...

Previously Removed Malicious Extensions Fou...

Previously Removed Malicious Extensions Found Again on OpenVSX

A cyber threat actor named TigerJack has been attacking developers by posting ...

×