Coinbase Cartel Targets High-Value Sectors with Data-Theft-First Extortion Strategy
Coinbase Cartel Targets High-Value Sectors with Data-Theft-First Extortion Strategy
Coinbase Cartel Targets High-Value Sectors with Data-Theft-First Extortion Strategy
SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits
Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days
Chinese cyberspies breach Singapore's four largest telcos
DPRK IT Workers Impersonating Individuals Using Real LinkedIn Accounts to Apply for Remote Roles
GuLoader Uses Polymorphic Code and Trusted Cloud Hosting to Evade Reputation-Based Defenses
Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data
Microsoft: Exchange Online flags legitimate emails as phishing
New Node.js Based LTX Stealer Attackers Users to Exfiltrate Login Credentials
Claude Desktop Extensions 0-Click RCE Vulnerability Exposes 10,000+ Users to Remote Attacks
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign
BeyondTrust warns of critical RCE flaw in remote support software
CISA orders federal agencies to replace end-of-life edge devices
Flickr discloses potential data breach exposing users' names, emails
RenEngine Loader Using Stealthy Multi‑Stage Execution Chain to Bypass Security Controls
Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
CISA: VMware ESXi flaw now exploited in ransomware attacks