News
Session hijacking now drives enterprise breaches—88% involve stolen credentials, often exploited within hours.
Mimo exploits CVE-2025-32432 in Craft CMS days after disclosure, deploying cryptominer and proxyware for monetization.
The attack works by targeting session tokens. This enables the attackers to subvert even multi-factor authentication (MFA); ...
Amazon-hosted IPs scanned 75 tech targets on May 8 in a one-day exploit surge, showing orchestrated cloud-based recon.
Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more ...
Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a ...
Void Blizzard targeted over 20 NGOs using credential phishing via fake Entra logins, exfiltrating sensitive cloud data.
The ZIP archive ("BitDefender.zip") contains an executable called "StoreInstaller.exe," which includes malware configurations ...
Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools ...
Mobile-focused phishing using SEO poisoning and fake portals hit payroll systems in May 2025, rerouting salaries and evading ...
Unlike human beings logging into systems, NHIs rarely have any policies to mandate rotation of credentials, tightly scope ...
Luna Moth uses spoofed IT domains and callback phishing to access law firm data, bypassing detection with legitimate tools.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results