Hackers Intensify Use of This Manipulative Technique to Deceive Users
A novel social engineering technique dubbed “ClickFix” has surged by an alarming 517% between the second half of 2024 and...
Read more →A novel social engineering technique dubbed “ClickFix” has surged by an alarming 517% between the second half of 2024 and...
Read more →After nearly four decades as a symbol of frustration and failure for PC users worldwide, Microsoft is officially retiring the...
Read more →A critical security vulnerability has been discovered in multiple Mitsubishi Electric air conditioning systems, potentially allowing hackers to bypass authentication...
Read more →A 27-year-old former student of Western Sydney University has been charged with a string of cyber offences, following an extensive...
Read more →A critical pre-authentication vulnerability (CVE-2025-6709) in MongoDB Server enables unauthenticated attackers to trigger denial-of-service (DoS) conditions by exploiting improper input...
Read more →A Kansas City man has pleaded guilty to federal charges after admitting he hacked into the computer systems of multiple...
Read more →A newly disclosed critical vulnerability in the Open VSX Registry, the open-source marketplace for Visual Studio Code (VS Code) extensions,...
Read more →Researchers at BallisKit have introduced a sophisticated scenario within their MacroPack Pro tool to obfuscate and weaponize .NET assemblies, significantly...
Read more →A severe security flaw has been identified in IBM WebSphere Application Server, potentially allowing remote attackers to execute arbitrary code...
Read more →The Iranian threat group Educated Manticore, also tracked as APT35, APT42, Charming Kitten, or Mint Sandstorm, has intensified its cyber-espionage...
Read more →A severe security flaw, dubbed nOAuth, has been identified in certain software-as-a-service (SaaS) applications integrated with Microsoft Entra ID, potentially...
Read more →CloudSEK’s TRIAD team has made the shocking discovery that the Androxgh0st botnet is a persistent and dynamic cyberthreat. It has...
Read more →