Hackers Stole Customer Data from Salesforce Instances
Palo Alto Networks has confirmed that it was affected by a supply chain attack, resulting in the theft of customer...
Read more →Palo Alto Networks has confirmed that it was affected by a supply chain attack, resulting in the theft of customer...
Read more →A novel variant of the ClickFix attack has recently emerged, masquerading as a legitimate AnyDesk installer to spread the MetaStealer...
Read more →A sophisticated Windows-based keylogger known as TinkyWinkey began surfacing on underground forums in late June 2025, targeting enterprise and individual...
Read more →On August 29, 2025, Microsoft announced the retirement of its popular Microsoft Editor browser extensions for Microsoft Edge and Google...
Read more →Cloudflare, a company that provides web security and infrastructure, recently reported that it stopped a huge cyber attack. This attack...
Read more →A sophisticated subgroup of the Lazarus threat actor has surfaced in recent months, deploying three distinct remote access trojans (RATs)...
Read more →A critical flaw in the Mobile Security Framework (MobSF) has been discovered, allowing authenticated attackers to upload and execute malicious...
Read more →A critical denial-of-service vulnerability in HashiCorp Vault could allow malicious actors to overwhelm servers with specially crafted JSON payloads, leading...
Read more →Nmap has remained at the forefront of network discovery and security assessment for nearly three decades. Originally introduced on September...
Read more →A critical security vulnerability has emerged in Azure Active Directory (Azure AD) configurations that exposes sensitive application credentials, providing attackers...
Read more →Multiple critical vulnerabilities in Qualcomm Technologies’ proprietary Data Network Stack and Multi-Mode Call Processor that permit remote attackers to execute...
Read more →Cybersecurity company Zscaler has confirmed it fell victim to a widespread supply-chain attack that exposed customer contact information through compromised...
Read more →