News

Login Page Hacker

PoisonSeed phishing kit: It replaces secure login options with weaker alternatives like passwords or SMS Target: Microsoft 365, Google Workspace,…

|
Published on July 19, 2025
ExpressVPN Fixes Windows App Bug Affecting RDP Traffic Routing

ExpressVPN fixed a bug where RDP traffic bypassed the VPN tunnel via port 3389. The issue was caused by debug…

|
Published on July 19, 2025

What happened: Attackers exploit Google Tag Manager in WordPress websites to redirect users to malicious domains. Why it matters: Malicious…

|
Published on July 18, 2025

Flaw impact: A TeleMessage communication tool vulnerability permits unauthenticated endpoint access, exposing sensitive user details. Critical risks: This flaw critically…

|
Published on July 18, 2025

What happened: Public GitHub repositories were leveraged to host the Emmenhtal loader, Amadey malware, and AsyncRAT. Multi-stage infection: The Emmenhtal…

|
Published on July 18, 2025

What happened: A Special Forces headquarters email containing relocation details for Afghans was sent to the wrong recipient. People impacted:…

|
Published on July 18, 2025

Trick Cloaking: The Hoax Tech and JS Click Cloaker intelligent cloaking solutions are used for shielding fraudulent websites. AI-powered tools:…

|
Published on July 17, 2025
Russia Considers Fines for VPN Use, Banned Content Searches

Russia plans fines for users searching extremist content, even when using VPN services. New law proposes penalties for advertising VPNs…

|
Published on July 17, 2025

Prolonged access: Salt Typhoon gained extensive access to the National Guard’s internal network for nearly a year. Extended compromise: The…

|
Published on July 17, 2025

Cryptocurrency theft: Octalyn Stealer aggressively targets cryptocurrency wallets like Bitcoin, Ethereum, Litecoin, and Monero. VPNs targeted: It captures VPN configuration…

|
Published on July 17, 2025

Operation Eastwood: Global authorities have taken down over 100 servers used for DDoS attacks on various entities. Why it matters:…

|
Published on July 17, 2025
Encryption at Risk Experts Sound Alarm Over EU's New Data Access Plan

EU’s 2030 roadmap proposes lawful access to encrypted data for law enforcement agencies. Experts concern for EU's plan shows how…

|
Published on July 17, 2025

A Blocking First: Cloudflare is the first anti-piracy internet intermediary beyond ISPs to block pirate sites. Legal Reasons: A legal…

|
Published on July 16, 2025

What Happened: Cameron John Wagenius pleaded guilty to extra charges in an ongoing lawsuit, including ransomware extortion. Fraud Conspiracy: DOJ…

|
Published on July 16, 2025

What Happened: The Ukrainian BO Team claimed a successful Gaskar Group network and server infrastructure breach. Assets Impacted: The attackers…

|
Published on July 16, 2025

An Australian-Russian national, Simeon Boikov, was sanctioned for disseminating false information on critical topics. The individual spread misinformation targeting the…

|
Published on July 16, 2025

Phishing campaigns are leveraging a sophisticated method called SVG smuggling. Attackers exploit SVGs by disguising malicious JavaScript code as part…

|
Published on July 15, 2025

Attackers utilize advanced phishing to exploit trust in software downloads from familiar-looking websites. Security researchers flagged over 600 domains linked…

|
Published on July 15, 2025
Man Key Data Network

A government employee with ties to DOGE was the source of another API key data breach. Marko Elez leaked a…

|
Published on July 15, 2025

DragonForce listed U.S. department store chain Belk as its latest victim. The attackers reportedly accessed and exfiltrated confidential information. Belk…

|
Published on July 15, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: