Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number
Summary 1. Scammers inject fake phone numbers into legitimate company websites (Netflix, Microsoft, Bank of America) using malicious URL parameters....
Read more →Summary 1. Scammers inject fake phone numbers into legitimate company websites (Netflix, Microsoft, Bank of America) using malicious URL parameters....
Read more →A sophisticated phishing campaign masquerading as official Social Security Administration (SSA) communications has successfully compromised more than 2,000 devices, according...
Read more →A sophisticated malware campaign has emerged that exploits legitimate ConnectWise remote access software to create validly signed malicious applications, representing...
Read more →A critical security vulnerability has been discovered in Performave Convoy that allows unauthenticated remote attackers to execute arbitrary code on...
Read more →A critical security vulnerability has been discovered in OPPO’s Clone Phone feature that could expose sensitive user data through inadequately...
Read more →The Department of Homeland Security has issued a critical advisory warning of escalating cyber threats from pro-Iranian hacktivist groups targeting...
Read more →A sophisticated phishing campaign emerged in May 2025, targeting U.S. citizens through a coordinated impersonation of state Department of Motor...
Read more →A sophisticated malware campaign has emerged targeting WordPress and WooCommerce websites with highly obfuscated credit card skimmers and credential theft...
Read more →Two critical vulnerabilities in Aviatrix Controller, a Software-Defined Networking (SDN) utility that enables cloud connectivity across different vendors and regions. ...
Read more →The Open Web Application Security Project (OWASP) has announced the development of a comprehensive OWASP AI Testing Guide, marking a...
Read more →Summary 1. A high-severity flaw (CVE-2025-6218) in WinRAR allows attackers to execute arbitrary code by exploiting how the software handles...
Read more →A sophisticated cybercriminal campaign has emerged targeting professionals through meticulously crafted fake Zoom applications designed to execute system takeover commands....
Read more →