17 posts were published in the last hour
- 14:4 : Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website
- 14:4 : Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques
- 13:32 : Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications
- 13:32 : January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate
- 13:32 : CyberArk snaps up Zilla Security for up to $175M
- 13:32 : Introducing Cortex Cloud — The Future of Real-Time Cloud Security
- 13:32 : Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job
- 13:32 : Sandworm APT’s initial access subgroup hits organizations accross the globe
- 13:5 : FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now!
- 13:5 : Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks
- 13:5 : 30,000 WordPress Sites Exposed to Exploitation via File Upload Vulnerability
- 13:5 : New Phishing Attacks Abuses Webflow CDN & CAPTCHAs to Steal Credit Card details
- 13:5 : Threat Actors in Russia, China, and Iran Targeting Local communities in the U.S
- 13:5 : Barcelona-based spyware startup Variston shuts down, per filing
- 13:5 : Sophos lays off 6% of workforce following Secureworks acquisition
- 13:5 : Russia-linked APT Seashell Blizzard is behind the long running global access operation BadPilot campaign
- 13:5 : National Apprenticeship Week: Alternative Routes into Cyber