New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials
Wed, 23 Jul 2025 18:28:00 +0530
Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages
Wed, 23 Jul 2025 14:58:00 +0530
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks
Wed, 23 Jul 2025 11:54:00 +0530
CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF
Wed, 23 Jul 2025 11:53:00 +0530
Microsoft Links Ongoing SharePoint Exploits to Three Chinese Hacker Groups
Tue, 22 Jul 2025 21:15:00 +0530
Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access
Tue, 22 Jul 2025 18:38:00 +0530
Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate
Tue, 22 Jul 2025 18:30:00 +0530
Hackers Exploit SharePoint Zero-Day Since July 7 to Steal Keys, Maintain Persistent Access
Tue, 22 Jul 2025 13:29:00 +0530
Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents
Mon, 21 Jul 2025 22:48:00 +0530
China-Linked Hackers Launch Targeted Espionage Campaign on African IT Infrastructure
Mon, 21 Jul 2025 21:57:00 +0530
⚡ Weekly Recap: SharePoint 0-Day, Chrome Exploit, macOS Spyware, NVIDIA Toolkit RCE and More
Mon, 21 Jul 2025 17:08:00 +0530
PoisonSeed Hackers Bypass FIDO Keys Using QR Phishing and Cross-Device Sign-In Abuse
Mon, 21 Jul 2025 11:43:00 +0530
Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
Mon, 21 Jul 2025 09:00:00 +0530
Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access
Mon, 21 Jul 2025 08:55:00 +0530
3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics
Mon, 21 Jul 2025 08:30:00 +0530
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
Sun, 20 Jul 2025 21:43:00 +0530
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Company Servers
Sun, 20 Jul 2025 15:22:00 +0530
Malware Injected into 7 npm Packages After Maintainer Tokens Stolen in Phishing Attack
Sun, 20 Jul 2025 15:10:00 +0530
Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers
Sun, 20 Jul 2025 13:05:00 +0530
China's Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
Sat, 19 Jul 2025 00:12:00 +0530
UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
Fri, 18 Jul 2025 23:53:00 +0530
Share this story
Industry 4.0, the Fourth Industrial Revolution, and 4IR.
LEARN MOREThe key features and benefits of Endpoint Detection and Response (EDR).
LEARN MOREGoogle's global exhibition of inspiration, innovation, and education
LEARN MOREExplore how cutting-edge technologies empower business at the AWS Summit.
LEARN MORELeverage trends, strategies, and predictions to give your business a competitive edge.
LEARN MOREHow to scale from VMs to Kubernetes.
LEARN MOREGet all of the Azure migration tools and guidance you need to plan and implement your move to the cloud – and track your progress using a central dashboard that provides intelligent insights.
Watch VideoLet us know what you think about the article.
Let us know what you’re interested in and the issues that matter to you.