fp-6a
-
Read moreA severe vulnerability in LG WebOS smart TVs enables attackers on the local network to bypass authentication, gain root access, and fully compromise the device. Update your firmware immediately to protect your TV.
-
Read moreMicrosoft’s September 2025 Patch Tuesday addresses 81 security flaws, including two publicly disclosed zero-day vulnerabilities in SMB Server and Microsoft SQL Server. Learn about critical updates and other vendor patches.
-
Read moreCybercriminals use a fake Microsoft Teams download site to distribute the Odyssey macOS stealer, stealing credentials, crypto wallets, and sensitive data. Learn how to protect your Mac.
-
Read moreResearchers found 8 malicious NPM packages targeting Windows Chrome users with obfuscated code to steal passwords, credit cards, and crypto wallets. Learn more.
-
Read moreA large-scale scanning campaign is targeting Microsoft Remote Desktop Protocol (RDP) services, utilizing over 30,000 unique IP addresses. Learn about the attack's methodology and implications for credential-based attacks.
-
Read moreThe Indian government has introduced a new policy for secure sharing of transport data through the National Transport Repository. Learn about the guidelines, affected platforms, and privacy measures.
-
Read moreFortinet users are being warned of potential cyberattacks targeting their VPN tools. Learn about the latest threats, how to identify them, and steps to take to protect your network.
-
Read moreDiscover how RingReaper, a sophisticated malware strain, targets Linux environments and evades traditional endpoint detection and response systems using advanced techniques. Learn about its impact on security.
-
Read moreDiscover the advanced evasion techniques and encryption methods used by the Lockbit ransomware variant targeting Linux-based ESXi servers. Learn how it operates and the implications for cybersecurity.
-
Read moreCisco has addressed a critical vulnerability (CVE-2025-20265) in its Secure Firewall Management Center Software, allowing unauthenticated remote attackers to execute arbitrary shell commands. Learn more about the vulnerability and affected versions.