A highly coordinated phishing campaign surfaced, targeting U.S. citizens by impersonating various state Departments of Motor Vehicles (DMVs). This widespread attack utilized SMS phishing, or […]
BlackHat AI Tool WormGPT Enhanced with Grok and Mixtral
The rapid evolution of large language models (LLMs) has not only transformed legitimate industries but has also found its way into the hands of cybercriminals. […]
Google Chrome Vulnerabilities Enable Arbitrary Code Execution – Update Now!
Google has released a crucial security update for its Chrome browser, addressing multiple high-severity vulnerabilities that could allow attackers to execute arbitrary code on affected […]
Cybercriminals Leverage ClickFix Strategy to Deploy RATs and Data-Stealing Malware
Cybercriminals are increasingly exploiting a deceptive social engineering technique known as ClickFix to initiate multi-stage cyberattacks, delivering remote access trojans (RATs) and data-stealing malware with […]
Qilin Ransomware Emerges as a Major Threat Targeting Windows, Linux, and ESXi Systems
Qilin ransomware has emerged as a formidable force, rapidly ascending to prominence amid the collapse of once-dominant groups like RansomHub and LockBit in 2025. Active […]
Hackers Claim Breach of Scania Financial Services, Leak Sensitive Data
A significant data breach has rocked Sweden’s Scania Financial Services, as a threat actor operating under the alias “hensi” claims to have infiltrated the subdomain […]
New Winos 4.0 Malware Strain Emerges as Major Threat to Windows Systems
FortiGuard Labs has uncovered a formidable new strain of malware, dubbed Winos 4.0, targeting Microsoft Windows users, with a particular focus on individuals in Taiwan. […]
Critical Privilege Escalation Flaws Grant Full Root Access on Multiple Linux Distros
The Qualys Threat Research Unit (TRU) has uncovered two interconnected local privilege escalation (LPE) vulnerabilities—CVE-2025-6018 and CVE-2025-6019—that together enable attackers to gain full root access […]
GitHub Actions attack renders even security-aware orgs vulnerable
Developers hosting code repositories on GitHub continue to use GitHub Actions insecurely, setting up automatic workflows that can be exploited to extract sensitive authentication tokens, […]
CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed a security flaw impacting the Linux kernel in its Known Exploited Vulnerabilities (KEV) catalog, […]