![]() Hackers Exploit Blockchain Smart Contracts ...Hackers Exploit Blockchain Smart Contracts to Distribute Malware Through Compromised WordPress SitesUNC5142, a financially motivated threat actor, is using blockchain smart contr... Published Date:
2025-10-17
| ![]() Critical GDI Vulnerability in Windows Rust ...Critical GDI Vulnerability in Windows Rust Kernel Module Causes System InstabilityA newly discovered vulnerability in Microsoft's Rust-based Graphics Device... Published Date:
2025-10-17
| ![]() Fake Microsoft Support Scam Tricks Users in...Fake Microsoft Support Scam Tricks Users into Giving Up CredentialsThere is a new tech support scam that utilizes Microsoft's brand name to t... Published Date:
2025-10-17
|
![]() Fake Microsoft Support Scam Tricks Users in...Fake Microsoft Support Scam Tricks Users into Giving Up CredentialsThere is a new tech support scam that utilizes Microsoft's brand name to t... Published Date:
2025-10-17
| ![]() AI Used to Boost Cyberattacks and Create Ma...AI Used to Boost Cyberattacks and Create Malware, Report FindsCybercriminals are increasingly using artificial intelligence to develop malwa... Published Date:
2025-10-17
| ![]() VMware Workstation and Fusion 25H2 Update I...VMware Workstation and Fusion 25H2 Update Introduces New Features and Expanded OS CompatibilityVMware has released Workstation 25H2 and Fusion 25H2, the latest versions of i... Published Date:
2025-10-17
|
![]() Cisco IP Phone Bugs in CUCM-Registered Devi...Cisco IP Phone Bugs in CUCM-Registered Devices Allow Remote DoS and XSS Threatening Network and Device StabilityCisco has issued a security advisory highlighting multiple vulnerabilities in ... Published Date:
2025-10-17
| ![]() Prosper Data Breach Exposes Personal Inform...Prosper Data Breach Exposes Personal Information of 17.6 Million UsersHackers have breached the systems of Prosper, a U.S.-based peer-to-peer lendin... Published Date:
2025-10-17
| ![]() North Korea-Linked Hackers Exploit EtherHid...North Korea-Linked Hackers Exploit EtherHiding Technique in Advanced Crypto Theft CampaignA North Korea-linked hacking group has been detected using the EtherHiding tec... Published Date:
2025-10-17
|
![]() Log Poisoning Attack Exploits phpMyAdmin to...Log Poisoning Attack Exploits phpMyAdmin to Deliver Gh0st RATHuntress researchers discovered an advanced intrusion of chained log poisoning... Published Date:
2025-10-17
| ![]() Critical Deno Vulnerability Enables Command...Critical Deno Vulnerability Enables Command Injection via Batch Files on WindowsThe Deno project has announced a new security advisory addressing a command in... Published Date:
2025-10-17
| ![]() Akka.NET TLS Vulnerability Exposes Clusters...Akka.NET TLS Vulnerability Exposes Clusters to Untrusted Access (CVE-2025-61778)A critical vulnerability has been discovered in Akka.NET’s Akka.Remote modul... Published Date:
2025-10-17
|
![]() Sotheby’s Confirms Data Breach Exposing C...Sotheby’s Confirms Data Breach Exposing Customer Financial and Personal InformationSotheby’s, one of the world’s leading auction houses, has disclosed a data... Published Date:
2025-10-17
| ![]() Severe Samba Flaw Enables Unauthenticated A...Severe Samba Flaw Enables Unauthenticated Attackers to Execute Commands RemotelyA critical vulnerability identified as CVE-2025-10230 has been discovered in S... Published Date:
2025-10-17
| ![]() Windows Scheduled Tasks Used to Spread Vall...Windows Scheduled Tasks Used to Spread ValleyRATA targeted espionage campaign has been observed using carefully tailored spear... Published Date:
2025-10-17
|
![]() TP-Link AX1800 Media-Sharing Vulnerability ...TP-Link AX1800 Media-Sharing Vulnerability Leads to Root ShellSecurity researcher Rocco Calvi disclosed a critical vulnerability in TP-Link ... Published Date:
2025-10-17
| ![]() Critical UEFI Shell Bug Exposes 200K Framew...Critical UEFI Shell Bug Exposes 200K Framework Laptops to Secure Boot BypassSecurity experts have discovered severe vulnerabilities in Microsoft-signed UE... Published Date:
2025-10-17
| ![]() Previously Removed Malicious Extensions Fou...Previously Removed Malicious Extensions Found Again on OpenVSXA cyber threat actor named TigerJack has been attacking developers by posting ... Published Date:
2025-10-17
|