-
A sophisticated credential-stealing campaign named “Operation PCPcat” has compromised over 59,000 Next.js servers worldwide, exploiting critical vulnerabilities in the popular React framework to harvest sensitive authentication data at indu…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity specialists from the Solar 4RAYS cyberthreat research center, a division of the Solar Group, have uncovered a dangerous new malware strain dubbed “Webrat.” This sophisticated threat has been identified as a multi-functional re…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
MongoDB has disclosed a critical security vulnerability tracked as CVE-2025-14847 that could allow attackers to extract uninitialized heap memory from database servers without authentication. The flaw, affecting multiple MongoDB versions dating back to…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Law enforcement agencies across 19 countries have made a significant breakthrough in combating cybercrime, arresting 574 suspects and recovering approximately USD 3 million during a month-long coordinated operation across Africa. The crackdown undersco…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
HardBit ransomware continues its evolution with the release of version 4.0, introducing sophisticated mechanisms to establish persistence through vulnerable network services. The latest variant leverages open Remote Desktop Protocol (RDP) and Server Me…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Tax-themed phishing campaigns have intensified in recent months, capitalizing on the heightened awareness surrounding India’s Income Tax Return (ITR) filing season. Public discussions about refund timelines and compliance deadlines create an idea…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical remote code execution vulnerability in n8n, a popular open-source workflow automation platform, threatens over 103,000 potentially vulnerable instances worldwide. Tracked as CVE-2025-68613 with a maximum CVSS severity score of 9.9, the flaw …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
North Korean-backed threat actors are impersonating writers from major Korean broadcasting companies to deliver malicious documents and establish initial access to targeted systems, according to threat intelligence research by Genians Security Center. …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Jamf Threat Labs has uncovered a new MacSync Stealer campaign that significantly raises the bar for macOS malware delivery by abusing Apple’s own trust mechanisms. The latest variant is delivered as a fully code‑signed and notarized Swift application, …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Anna’s Archive, a prominent digital preservation platform, has announced the largest unauthorized extraction of Spotify music data ever recorded. The hacktivist group scraped approximately 86 million songs from the streaming service, representing…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


