Phishing campaigns are leveraging a sophisticated method called SVG smuggling. Attackers exploit SVGs by disguising malicious JavaScript code as part of the graphic's structure. This approach helps cybercriminals circumvent traditional…

|
Published on July 15, 2025

Attackers utilize advanced phishing to exploit trust in software downloads from familiar-looking websites. Security researchers flagged over 600 domains linked to fake Telegram APK files. Android users were targeted via…

|
Published on July 15, 2025

A government employee with ties to DOGE was the source of another API key data breach. Marko Elez leaked a private API key to xAI, reportedly providing unrestricted access to…

|
Published on July 15, 2025

DragonForce listed U.S. department store chain Belk as its latest victim. The attackers reportedly accessed and exfiltrated confidential information. Belk previously acknowledged unauthorized third-party access to internal files. The DragonForce…

|
Published on July 15, 2025

A Google Gemini for Workspace prompt-injection vulnerability that allows for hidden prompts. Attackers use a known technique – zero font size and white text to hide content from users in…

|
Published on July 14, 2025

Stormous Ransomware published samples from an alleged data breach targeting North Country HealthCare. The threat actor intends to sell 500,000 patient records and leak another 100,000. The stolen data reportedly…

|
Published on July 14, 2025

Numerous industries are targeted in a KongTuke campaign that transitions to a FileFix variant. Attackers employ fake CAPTCHA verifications to deploy an enhanced version of the Interlock RAT. It utilizes…

|
Published on July 14, 2025
Latest

A Blocking First: Cloudflare is the first anti-piracy internet intermediary beyond ISPs to block pirate sites. Legal Reasons: A legal…

|
Published

Doxing of Immigration and Customs Enforcement (ICE) officers has surged, particularly in Portland. This is attributed to Antifa-affiliated groups like…

|
Published on July 12, 2025

The macOS.ZuRu malware resurfaced, hiding in the popular SSH client and server-management Termius app. The novel variant uses the open-source…

|
Published on July 11, 2025
Pirate logo (skull and crossbones)

NSW2U and several other prominent domains harboring pirated games were taken down in an FBI operation. These platforms were notorious…

|
Published on July 11, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: