fp-3a
-
Read moreNew GPUBreach attack uses RowHammer on GPU memory to gain full CPU access, bypassing protections and posing risks to AI and cloud systems.
-
Read moreIndia plans to restrict Hikvision, Dahua, and TP-Link CCTV sales under new cybersecurity rules, boosting domestic surveillance brands and data security.
-
Read moreInfiniti Stealer is a new macOS malware spreading through fake Cloudflare CAPTCHA pages, tricking users into running malicious commands and stealing sensitive data.
-
Read moreCyber attackers are abusing safe link URL rewriting and multi-layer redirects to bypass email security filters and steal Microsoft 365 credentials through phishing campaigns.
-
Read moreA critical SolarWinds Web Help Desk vulnerability (CVE-2025-26399) allows attackers to execute commands via deserialization flaws. CISA warns organizations to patch immediately.
-
Read moreA new phishing campaign targeting LastPass users uses fake support emails, display name spoofing, and fraudulent login pages to steal vault master passwords.
-
Posted: January 20, 2026Views: 538Read moreUrgent alert: McDonald's India reportedly targeted by the Everest ransomware group. Over 861 GB of data compromised. Learn the details and how to secure your account
-
Read morePhishing scams with fake invoices deploy XWorm—learn the tactics, risks, and defenses to avoid credential theft and ransomware.
-
Posted: November 14, 2025Views: 194Read moreUhale app in photo frames auto-downloads malware—learn about the risks, affected brands, and tips to secure your IoT devices.
-
Read moreMedusa and DragonForce use SimpleHelp flaws for attacks—learn about the tactics, impacts, and defenses against supply chain ransomware.