News


What happened: Attackers exploit Google Tag Manager in WordPress websites to redirect users to malicious domains. Why it matters: Maliciousโ€ฆ

|
Published on July 18, 2025

Flaw impact: A TeleMessage communication tool vulnerability permits unauthenticated endpoint access, exposing sensitive user details. Critical risks: This flaw criticallyโ€ฆ

|
Published on July 18, 2025

What happened: Public GitHub repositories were leveraged to host the Emmenhtal loader, Amadey malware, and AsyncRAT. Multi-stage infection: The Emmenhtalโ€ฆ

|
Published on July 18, 2025

What happened: A Special Forces headquarters email containing relocation details for Afghans was sent to the wrong recipient. People impacted:โ€ฆ

|
Published on July 18, 2025

Trick Cloaking: The Hoax Tech and JS Click Cloaker intelligent cloaking solutions are used for shielding fraudulent websites. AI-powered tools:โ€ฆ

|
Published on July 17, 2025
Russia Considers Fines for VPN Use, Banned Content Searches

Russia plans fines for users searching extremist content, even when using VPN services. New law proposes penalties for advertising VPNsโ€ฆ

|
Published on July 17, 2025

Prolonged access: Salt Typhoon gained extensive access to the National Guardโ€™s internal network for nearly a year. Extended compromise: Theโ€ฆ

|
Published on July 17, 2025

Cryptocurrency theft: Octalyn Stealer aggressively targets cryptocurrency wallets like Bitcoin, Ethereum, Litecoin, and Monero. VPNs targeted: It captures VPN configurationโ€ฆ

|
Published on July 17, 2025

Operation Eastwood: Global authorities have taken down over 100 servers used for DDoS attacks on various entities. Why it matters:โ€ฆ

|
Published on July 17, 2025
Encryption at Risk Experts Sound Alarm Over EU's New Data Access Plan

EUโ€™s 2030 roadmap proposes lawful access to encrypted data for law enforcement agencies. Experts concern for EU's plan shows howโ€ฆ

|
Published on July 17, 2025

A Blocking First: Cloudflare is the first anti-piracy internet intermediary beyond ISPs to block pirate sites. Legal Reasons: A legalโ€ฆ

|
Published on July 16, 2025

What Happened: Cameron John Wagenius pleaded guilty to extra charges in an ongoing lawsuit, including ransomware extortion. Fraud Conspiracy: DOJโ€ฆ

|
Published on July 16, 2025

What Happened: The Ukrainian BO Team claimed a successful Gaskar Group network and server infrastructure breach. Assets Impacted: The attackersโ€ฆ

|
Published on July 16, 2025

An Australian-Russian national, Simeon Boikov, was sanctioned for disseminating false information on critical topics. The individual spread misinformation targeting theโ€ฆ

|
Published on July 16, 2025

Phishing campaigns are leveraging a sophisticated method called SVG smuggling. Attackers exploit SVGs by disguising malicious JavaScript code as partโ€ฆ

|
Published on July 15, 2025

Attackers utilize advanced phishing to exploit trust in software downloads from familiar-looking websites. Security researchers flagged over 600 domains linkedโ€ฆ

|
Published on July 15, 2025
Man Key Data Network

A government employee with ties to DOGE was the source of another API key data breach. Marko Elez leaked aโ€ฆ

|
Published on July 15, 2025

DragonForce listed U.S. department store chain Belk as its latest victim. The attackers reportedly accessed and exfiltrated confidential information. Belkโ€ฆ

|
Published on July 15, 2025

A Google Gemini for Workspace prompt-injection vulnerability that allows for hidden prompts. Attackers use a known technique โ€“ zero fontโ€ฆ

|
Published on July 14, 2025

Stormous Ransomware published samples from an alleged data breach targeting North Country HealthCare. The threat actor intends to sell 500,000โ€ฆ

|
Published on July 14, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: