Threat
Covers malicious cyber attacks like malware, ransomware, phishing, and DDoS that target systems, data, and networks. Stay informed on emerging threats, attac…
Popular
JDownloader Compromised: Malicious Windows & Linux
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
JDownloader Compromised: Malicious Windows & Linux
JDownloader, a download manager widely trusted by millions,...
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
Within less than a year, Gunra ransomware has rapidly evolved...
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
Shai-Hulud, a newly discovered and dangerous malware, has...
Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization
Attackers are abusing a lesser-known element within...
Microsoft Edge, Windows 11, LiteLLM H Hacked Pwn2Own
Pwn2Own Berlin 2026 commenced with a surge of zero-day exploits,...
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
For years, the stealthy OrBit rootkit has quietly targeted Linux...
Microsoft Warns: Attackers Use HPE Agent for Malware-
Microsoft has issued a warning concerning a sophisticated attack...
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
Operators of the Tycoon 2FA phishing kit have integrated a...
Critical cPanel Flaws Allow Access to Sensitive System
A critical wave of security vulnerabilities impacting cPanel and...
Amazon Redshift JDBC Driver Flaws Allow Remote Code Execution
A critical vulnerability within the Amazon Redshift JDBC driver...


