-
DarkSword exploit leak puts up to 270 million iPhones at risk, with hackers able to access data through…
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
CanisterWorm spreads via npm supply chain attack, hijacks developer accounts, targets Kubernetes clusters, and deploys destructive Kamikaze wiper payload.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
LAPSUS$ claims it breached AstraZeneca, offering alleged source code, credentials, cloud configs, and employee data for sale in leaked samples.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers at Sublime Security have discovered a new scam that uses realistic, interactive JavaScript-based Zoom meeting invites to trick users into installing malware.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers at Bitdefender have discovered a malicious Windsurf IDE extension using the Solana blockchain to steal developer credentials.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers detail “Claudy Day” flaws in Claude AI that could enable data theft using fake Google Ads, hidden…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers at Howler Cell have discovered a new .NET AOT malware campaign that uses a clever scoring system…
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new ClickFix scam tricks Windows users into running hidden commands that map hacker-controlled drives and load malware…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In mid-January 2026, Microsoft Defender Experts identified a devious way that cybercriminals are tricking people into giving away…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers at 7AI have revealed a new Claude Fraud campaign in which hackers use fake AI extensions and Google ads to steal data from tech professionals.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


