A worm-like spam campaign flooded NPM with over 43,000 fake packages, exposing major gaps in registry security and highlighting the need for stronger safeguards....
A sophisticated cross-platform attack bridges Windows PCs and Android devices, using Google's own service as a destructive tool.
Sophisticated phishing campaign compromises hotel Booking.com accounts, enabling criminals to scam guests with fraudulent payment requests....
Advanced ClickFix attacks now use OS fingerprinting and video tutorials to trick users. Learn the technical breakdown and defense-in-depth mitigation strategies....
Millionaire donors' net worth leaked in Penn data breach. Are you exposed? Check now.
A technical breakdown of the $128M Balancer DeFi exploit, detailing the precision vulnerability, attack methodology, and cross-chain impact....
Massive Penn data breach exposes 1.2 million donors' wealth secrets as hackers declare war on the Ivy League's fortune.
A massive leak of 183 million email credentials is causing panic online, but Google says your Gmail account wasn't hacked.
RedTiger malware has compromised over 408,000 gamers by weaponizing Discord. Discover how this stealer hijacks tokens, payment data, and accounts...
Critical analysis of a mass WordPress plugin exploit. Attackers use auth bypass flaws in GutenKit & Hunk Companion to install backdoors and achieve full site control....
Sign up to our Weekley Threat Digest and keep apace of the trends shaping Cybersecurity.