Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund TransfersCritical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers

5 days ago

Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that could allow attackers to silently drain…

APT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH KeysAPT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH Keys

APT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH Keys

5 days ago

Researchers have uncovered early indicators of malicious infrastructure linked to APT34, also known as OilRig, a suspected Iranian threat group…

Hackers Exploit Weaponized Word Docs to Steal Windows Login CredentialsHackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

5 days ago

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users with malicious Word documents designed to…

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server AccessCookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

5 days ago

Researchers have exposed a sophisticated cyberattack technique dubbed the "Cookie-Bite Attack," which allows adversaries to bypass Multi-Factor Authentication (MFA) and…

Synology Network File System Vulnerability Allows Unauthorized File AccessSynology Network File System Vulnerability Allows Unauthorized File Access

Synology Network File System Vulnerability Allows Unauthorized File Access

5 days ago

A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021, has been resolved after allowing unauthorized…

Super-Smart AI Could Launch Attacks Sooner Than We ThinkSuper-Smart AI Could Launch Attacks Sooner Than We Think

Super-Smart AI Could Launch Attacks Sooner Than We Think

6 days ago

In a development for cybersecurity, large language models (LLMs) are being weaponized by malicious actors to orchestrate sophisticated attacks at…

Hackers Deploy New Malware Disguised as Networking Software UpdatesHackers Deploy New Malware Disguised as Networking Software Updates

Hackers Deploy New Malware Disguised as Networking Software Updates

6 days ago

A sophisticated backdoor has been uncovered targeting major organizations across Russia, including government bodies, financial institutions, and industrial sectors. This…

CrowdStrike Launches Falcon® Privileged Access with Advanced Identity ProtectionCrowdStrike Launches Falcon® Privileged Access with Advanced Identity Protection

CrowdStrike Launches Falcon® Privileged Access with Advanced Identity Protection

6 days ago

CrowdStrike today announced the general availability of Falcon® Privileged Access, a breakthrough module in its Falcon® Identity Protection suite, aimed…

Zyxel Releases Patches for Privilege Management Vulnerabilities in FirewallsZyxel Releases Patches for Privilege Management Vulnerabilities in Firewalls

Zyxel Releases Patches for Privilege Management Vulnerabilities in Firewalls

6 days ago

Zyxel, a leading provider of secure networking solutions, has released critical security patches to address two privilege management vulnerabilities in…

Marks & Spencer Confirms Cyberattack Disrupting Payments and Online OrdersMarks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders

Marks & Spencer Confirms Cyberattack Disrupting Payments and Online Orders

6 days ago

Leading British retailer Marks & Spencer Group plc (M&S) has confirmed it has been grappling with a cyberattack over the…