News

North Korean hackers continue attacking open-source software via npm packages. 67 new malicious packages with XORIndex Loader ...
The JavaScript code acts as a traffic distribution system (TDS), using IP filtering techniques to redirect users to fake ...
Explore runtime reachability and why function-level execution is key to reducing false positives in vulnerability scanning.
A fake CAPTCHA is all it takes. Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix ...
CBI's Operation Chakra V dismantles a transnational tech support scam targeting UK, Australia. Over £390,000 lost in UK, two ...
Furthermore, the vulnerability could facilitate the extraction of the Kigen eUICC identity certificate, thereby making it ...
Fortinet fixes a critical SQL injection vulnerability in FortiWeb (CVE-2025-25257), posing risks to database security.
Mergers bring risk from misaligned policies and redundant accounts. Learn how to secure your identity landscape effectively.
Researchers uncover PerfektBlue flaws in OpenSynergy’s BlueSDK, exposing millions of vehicles to remote code execution ...
Four individuals were arrested in connection with £440M cyber attacks on Marks & Spencer, Co-op, and Harrods, linked to the ...
NVIDIA urges ECC activation to mitigate GPUHammer, a RowHammer exploit threatening AI accuracy and data integrity on GPUs.
A critical vulnerability in mcp-remote (CVE-2025-6514) allows remote code execution, affecting 437,000+ users.