fp-4b
-
A sophisticated OneDrive spearphishing campaign targets corporate executives with fake HR emails and Microsoft Office 365 login pages to steal credentials. Learn how to recognize and prevent this threat.
-
Discover how Sindoor Dropper malware uses weaponized .desktop files to infect Linux systems via spear-phishing and deploys MeshAgent RAT.
-
Discover PromptLock, the first AI-powered ransomware using OpenAI's gpt-oss:20b model, enabling sophisticated attacks across multiple platforms.
-
Join us in celebrating 34 years of Linux! Discover its journey from a hobby project to a powerhouse in computing, powering smartphones, supercomputers, and more.
-
A critical insecure deserialization vulnerability in N-able N-Central could allow attackers to execute arbitrary commands. Learn about the risks and recommended actions for organizations.
-
Cybercriminals are using free trials of Endpoint Detection and Response (EDR) software to disable existing security measures. Learn about the BYOEDR attack technique and its implications.
-
Microsoft has disclosed a critical zero-day vulnerability in SharePoint Server (CVE-2025-53770) with a CVSS score of 9.8. Learn about the active exploitation, impact on enterprises, and emergency patches available.