Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Cybersecurity researchers have detailed a malware campaign that's targeting Docker…

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported…

‘Cookie Bite’ Entra ID Attack Exposes Microsoft 365

A proof-of-concept (PoC) attack vector exploits two Azure authentication tokens…

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of…

DeepSeek Breach Opens Floodgates to Dark Web

The incident should serve as a critical wake-up call. The…

Threat Actors Manipulate Search Results to Direct Users to Malicious Websites

The digital landscape has become increasingly perilous as cybercriminals develop…

Oracle Acknowledges Data Breach and Starts Informing Affected Clients

Oracle Corporation has confirmed a data breach involving its older…

Binance Spoofers Compromise PCs in ‘TRUMP’ Crypto Scam

An email campaign luring users with offers of free President…

Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds

Everybody knows browser extensions are embedded into nearly every user’s…

CrushFTP Vulnerability Exploited to Gain Full Server Access

A critical vulnerability (CVE-2025-2825) in CrushFTP, a widely used enterprise…