North Korean Hackers Pose as Recruiters, Target Developers with 35 New Malicious npm Packages
A new cyber campaign orchestrated by North Korean threat actors has been exposed by the Socket Threat Research Team, revealing...
Read more →A new cyber campaign orchestrated by North Korean threat actors has been exposed by the Socket Threat Research Team, revealing...
Read more →A zero-day research project has uncovered eight new vulnerabilities in multifunction printers (MFPs) and related devices from Brother Industries, Ltd.,...
Read more →Researchers have uncovered a new malware sample in the wild that employs a unique and unconventional evasion tactic: prompt injection...
Read more →A sophisticated Android phishing campaign, aptly named “Wedding Invitation,” has emerged as a significant threat targeting mobile users across India....
Read more →The INTERPOL 2025 Africa Cyberthreat Assessment Report has raised alarms over a dramatic surge in cybercrime across Africa, with Western...
Read more →A critical security vulnerability (CVE-2025-4563) in Kubernetes allows nodes to bypass authorization checks for dynamic resource allocation, potentially enabling privilege...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency (NSA), has released a comprehensive guide...
Read more →Threat actors were discovered disseminating a malicious, altered version of SonicWall’s SSL VPN NetExtender application in a complex cyberattack that...
Read more →A recently discovered bug in Windows 11 has caused significant frustration among users, as the operating system’s update scanning process...
Read more →The United States has become a popular target for hacktivist groups in the escalating Israel-Iran conflict, following U.S. attacks on...
Read more →Mozilla has officially released Firefox 140, marking a significant update that addresses multiple security vulnerabilities, including a critical code execution...
Read more →A critical vulnerability in Realtek’s Bluetooth Low Energy (BLE) implementation enables attackers to launch denial-of-service (DoS) attacks during device pairing....
Read more →