A rapidly expanding cryptocurrency scam targeting Asia is blending two highly effective fraud models — malvertising … Crypto Scam in Asia: Malvertising Meets Pig ButcheringRead more
Latest News
Booking.com Phishing Campaign: Multi-Stage Fraud Exposed
The latest Booking.com phishing campaign is a stark reminder that attackers don’t just target individuals—they weaponize … Booking.com Phishing Campaign: Multi-Stage Fraud ExposedRead more
Malicious Chrome Extension Steals Facebook Business 2FA Codes
Cybercriminals are increasingly exploiting browser extensions to bypass security controls, putting high-value business accounts at risk. … Malicious Chrome Extension Steals Facebook Business 2FA CodesRead more
Apache NiFi Authorization Bypass Vulnerability (CVE-2026-25903)
Modern data pipelines power everything from fraud detection systems to healthcare analytics. But what happens when … Apache NiFi Authorization Bypass Vulnerability (CVE-2026-25903)Read more
Snail Mail Crypto Scams: Trezor & Ledger Users at Risk
Cryptocurrency users face increasingly sophisticated threats—not just online, but through traditional mail. Recently, hardware wallet owners … Snail Mail Crypto Scams: Trezor & Ledger Users at RiskRead more
Single Threat Actor Drives 83% of Ivanti RCE Exploitation
A recent surge in remote code execution (RCE) attacks targeting Ivanti Endpoint Manager Mobile (EPMM) has … Single Threat Actor Drives 83% of Ivanti RCE ExploitationRead more
AI Penetration Testing Tool: Automating Modern Security Assessments
Cyberattacks are becoming faster, stealthier, and more automated. In 2025 alone, organizations faced record-breaking ransomware campaigns … AI Penetration Testing Tool: Automating Modern Security AssessmentsRead more
New ClickFix Variant Hijacks DNS to Deliver Malware
A new evolution of the ClickFix social engineering campaign has emerged, introducing a stealthy DNS-based staging … New ClickFix Variant Hijacks DNS to Deliver MalwareRead more
ORB Networks Exploit Compromised IoT Devices for Masked Cyberattacks
Cyberattackers are increasingly using obfuscated networks of compromised devices to evade detection. Known as Operational Relay … ORB Networks Exploit Compromised IoT Devices for Masked CyberattacksRead more
Critical CVE-2025-64712 Vulnerability in Unstructured.io Puts Enterprises at Risk
A critical vulnerability (CVE-2025-64712) in Unstructured.io, a widely used ETL library for AI data processing, has … Critical CVE-2025-64712 Vulnerability in Unstructured.io Puts Enterprises at RiskRead more