Cybersecurity researchers have recently unveiled a sophisticated new Android malware family, dubbed Perseus, which is…
Tag: Hacking
Advanced EDR Killers Leverage Vulnerable Drivers to Cripple Enterprise Security, Escalating Ransomware Threat
A new comprehensive analysis by cybersecurity firm ESET has brought to light the alarming prevalence…
Global Law Enforcement Operation Dismantles Record-Breaking IoT Botnets Responsible for Massive DDoS Attacks
In a significant victory against sophisticated cybercrime, the U.S. Department of Justice (DoJ) announced on…
Magento E-commerce Platforms Under Siege: Critical ‘PolyShell’ API Flaw Emerges Amidst Widespread Defacement Campaign
E-commerce businesses relying on Magento are facing a dual threat to their digital storefronts following…
Threat Actors Unleash CanisterWorm, a Self-Propagating npm Malware Utilizing Internet Computer Protocol Canisters for Evasive Command-and-Control.
The sophisticated threat actors previously implicated in the supply chain attack against the widely used…
Russian Intelligence Services Unleash Widespread Phishing Campaign Targeting High-Value Individuals via Encrypted Messaging Apps
U.S. federal authorities have issued a stark warning regarding an aggressive and widespread cyber espionage…
Oracle Issues Urgent Security Update for Critical Identity and Web Services Manager Flaws Allowing Remote Code Execution
Ravie Lakshmanan Mar 21, 2026 Oracle has released a crucial set of security updates addressing…
CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday, March 21, 2026, issued a…
The Rise of AI-Enabled Cyberattacks Demands a Fundamental Shift in Cybersecurity Strategies
Artificial Intelligence (AI) is fundamentally transforming the landscape of cybercrime, ushering in an era where…
Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets
This latest incident specifically targeted the GitHub Actions workflows "aquasecurity/trivy-action" and "aquasecurity/setup-trivy." These actions are…
