News

Google has resolved a total of five zero-day vulnerabilities in Chrome that have been either actively exploited or ...
Researchers expose critical flaw in Windows Server 2025’s dMSA, enabling enterprise-wide access and lateral movement across ...
Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act | Read more hacking news on The ...
Malicious group UNC6148 exploits SonicWall vulnerabilities to deploy OVERSTEP backdoor, targeting patched appliances for data ...
Researchers uncover sophisticated Konfety Android malware using evil twin apps and complex evasion methods to conduct ad fraud.
From Bluetooth exploits in vehicles to macOS backdoors and GitHub phishing tricks—this week’s threats go deeper than they appear.
A new state-backed campaign using HazyBeacon malware targets Southeast Asian governments to collect sensitive data via AWS ...
GLOBAL GROUP ransomware, launched in June 2025, targets industries across multiple regions with AI-powered negotiation and ...
North Korean hackers continue attacking open-source software via npm packages. 67 new malicious packages with XORIndex Loader ...
"Overall, in Q2 2025, hyper-volumetric DDoS attacks skyrocketed," Omer Yoachimik and Jorge Pacheco said. "Cloudflare blocked ...
CBI's Operation Chakra V dismantles a transnational tech support scam targeting UK, Australia. Over £390,000 lost in UK, two ...
The JavaScript code acts as a traffic distribution system (TDS), using IP filtering techniques to redirect users to fake ...