Data Breach

  1. Cybercriminals Use Weaponized LNK Files to Steal User Data via Fake Credit Card Security Emails
  2. Hackers Embed Stealth Backdoor in WordPress Mu-Plugins for Persistent Admin Access
  3. CrushFTP CVE-2025-54309 Authentication Bypass Vulnerability Exploited
  4. Iranian Threat Actors Use AI-Generated Emails to Target Cybersecurity Experts
  5. Fancy Bear Hackers: APT28's Advanced Cyber Tools Targeting Governments and Military
  6. Critical Vulnerability in NVIDIA Container Toolkit: "NVIDIAScape"
  7. China-Backed Scam Factories Loot ₹7,000 Crore from Indians in Just 6 Months
  8. Cyber Storm Looms: Major Brand Breaches Signal Rising Cyber Threats
  9. 350M Cars Including Mercedes, Skoda, and Volkswagen at Risk from 1-Click Bluetooth RCE
  10. Critical Schneider Electric Vulnerabilities Expose Data Center Systems to OS Command Injection Risks
Back to Top