FortiGuard Labs has reported a sustained trend in the exploitation of open-source software (OSS) repositories for malware dissemination within supply…
Receiving an unexpected package in the post is not always a pleasant surprise. The FBI has warned the public about…
Amelia Coen | 05 August 2025 at 11:08 UTC Ever wondered how attackers can compromise modern websites by exploiting invisible…
Google has released security patches for six vulnerabilities in Android’s August 2025 security update, including two Qualcomm flaws exploited in…
The open-source software ecosystem, once considered a bastion of collaborative development, has become an increasingly attractive target for cybercriminals seeking…
MediaTek has disclosed three critical security vulnerabilities affecting dozens of its chipsets, potentially allowing attackers to gain elevated system privileges…
Why do SOC teams still drown in alerts even after spending big on security tools? False positives pile up, stealthy…
Microsoft will offer up to $5 million in bounty awards at this year’s Zero Day Quest hacking contest, which the…
North Korean-linked Famous Chollima APT group has emerged as a sophisticated threat actor, orchestrating targeted campaigns against job seekers and…
The Raspberry Robin malware, also known as Roshtyak, has undergone substantial updates that enhance its evasion and persistence on Windows…
SonicWall investigates possible zero-day amid Akira ransomware surge Pierluigi Paganini August 05, 2025 SonicWall probes possible new zero-day after spike…
A sophisticated method to bypass Web Application Firewall (WAF) protections using HTTP Parameter Pollution techniques combined with JavaScript injection. The…











