June 24, 2025 No Comments Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
June 24, 2025 No Comments U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues
June 24, 2025 No Comments APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine
June 24, 2025 No Comments China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom
June 23, 2025 No Comments Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content
June 23, 2025 No Comments DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes
June 23, 2025 No Comments XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks
June 23, 2025 No Comments Google Adds Multi-Layered Defenses to Secure GenAI from Prompt Injection Attacks
June 23, 2025 No Comments ⚡ Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More