August 26, 2025 No Comments ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners
August 26, 2025 No Comments HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands
August 26, 2025 No Comments CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
August 26, 2025 No Comments Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
August 25, 2025 No Comments Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3
August 25, 2025 No Comments UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
August 25, 2025 No Comments Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads
August 25, 2025 No Comments ⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More
August 25, 2025 No Comments Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations
August 25, 2025 No Comments Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing