Google’s Threat Intelligence Group (GTIG) has revealed that threat actors are abusing Gemini AI to automate … Google Warns of Hackers Exploiting Gemini AI for Multi-Stage MalwareRead more
Latest News
Dangerous duer-js NPM Package Infects Windows Users
A malicious NPM package named duer-js has been discovered targeting Windows users and developers. Disguised as … Dangerous duer-js NPM Package Infects Windows UsersRead more
Chrome 145 Security Update Patches Critical Code Execution Vulnerabilities
Google has released Chrome 145 to the stable channel for Windows, Mac, and Linux, addressing 11 … Chrome 145 Security Update Patches Critical Code Execution VulnerabilitiesRead more
Critical WPvivid Backup Plugin Vulnerability Exposes 800,000 WordPress Sites
A critical security flaw has been discovered in the WPvivid Backup & Migration WordPress plugin, putting … Critical WPvivid Backup Plugin Vulnerability Exposes 800,000 WordPress SitesRead more
Rogue VM Reveals Muddled Libra Tactics in VMware vSphere Attack
In September 2025, investigators uncovered a rogue virtual machine inside a VMware vSphere environment, which was … Rogue VM Reveals Muddled Libra Tactics in VMware vSphere AttackRead more
Netdragon Botnet Hijacks Feiniu NAS Devices
A new large-scale campaign is actively targeting Feiniu (fnOS) NAS devices, exploiting undisclosed vulnerabilities to compromise … Netdragon Botnet Hijacks Feiniu NAS DevicesRead more
DShield Captures Self-Propagating SSH Worm Exploiting Default Credentials
A new SSH worm combining credential stuffing with cryptographically verified commands has been captured by DShield … DShield Captures Self-Propagating SSH Worm Exploiting Default CredentialsRead more
DragonForce Ransomware: Cartel-Like Operations Target 363 Companies
Since its emergence in December 2023, DragonForce has quickly risen to prominence as a sophisticated Ransomware-as-a-Service … DragonForce Ransomware: Cartel-Like Operations Target 363 CompaniesRead more
ORB Networks: How Compromised IoT Devices Mask Cyberattacks
Operational Relay Box (ORB) networks have emerged as one of the most sophisticated tools used by … ORB Networks: How Compromised IoT Devices Mask CyberattacksRead more
287 Chrome Extensions Steal Browsing Data From 37.4M Users
A massive privacy breach has come to light: 287 Chrome extensions have been found exfiltrating browsing … 287 Chrome Extensions Steal Browsing Data From 37.4M UsersRead more