Critical Argo CD API Vulnerability Exposes Repository Credentials
A critical vulnerability has been discovered in Argo CD that allows API tokens with limited permissions to access sensitive repository...
Read more →A critical vulnerability has been discovered in Argo CD that allows API tokens with limited permissions to access sensitive repository...
Read more →A sophisticated malware campaign, dubbed “GPUGate,” abuses Google Ads and GitHub’s repository structure to trick users into downloading malicious software....
Read more →Penetration testing and ethical hacking have been dominated by specialized Linux distributions designed to provide security professionals with comprehensive toolsets...
Read more →A new ransomware threat has emerged as one of 2025’s most prolific cybercriminal operations, with SafePay ransomware claiming attacks against...
Read more →Cybercriminals unleashed a massive wave of mobile malware attacks during the second quarter of 2025, with security researchers detecting nearly...
Read more →A recent investigation has revealed that Microsoft employed China-based engineers to maintain and support SharePoint software, the same collaboration platform...
Read more →A sophisticated new threat actor designated TAG-150 has emerged as a significant cybersecurity concern, demonstrating rapid development capabilities and technical...
Read more →A sophisticated cyber campaign has emerged targeting U.S.-based organizations through trojanized ConnectWise ScreenConnect installers, marking a significant evolution in remote...
Read more →Canadian fintech giant Wealthsimple announced today that it has suffered a data breach, resulting in the unauthorized access of personal...
Read more →A sophisticated cyber campaign is targeting macOS users by distributing the potent “Odyssey” information stealer through a deceptive website impersonating...
Read more →A recently discovered strain of cryptomining malware has captured the attention of security teams worldwide by abusing the built-in Windows...
Read more →Cybercriminals are increasingly exploiting the trust organizations place in artificial intelligence platforms to conduct sophisticated phishing attacks, according to a...
Read more →