Posts | Rating | new post |
| PolarEdge C2 Communication via Custom Binary Protocol with Custom TLS Server | 0 user ratings | 2025-10-14 13:24:05 By: milo |
| Hackers Use Court-Themed Phishing to Deliver Info-Stealer Malware | 0 user ratings | 2025-10-14 13:02:46 By: milo |
| Discord Weaponized as C2 Server Across Popular Open-Source Package Repositories | 0 user ratings | 2025-10-14 12:14:47 By: milo |
| Malicious NPM Packages Used in Sophisticated Developer Cyberattack | 0 user ratings | 2025-10-14 11:03:03 By: milo |
| SAP NetWeaver Memory Corruption Flaw Lets Attackers Send Corrupted Logon Tickets | 0 user ratings | 2025-10-14 11:03:02 By: milo |
| Hackers Mimic as OpenAI and Sora Services to Steal Login Credentials | 0 user ratings | 2025-10-14 10:18:01 By: milo |
| SimonMed Data Breach Exposes Sensitive Information of 1.2 Million Patients | 0 user ratings | 2025-10-14 09:06:02 By: milo |
| North Korean IT Workers Use VPNs and Laptop Farms to Evade Identity Verification | 0 user ratings | 2025-10-14 08:57:51 By: milo |
| PoC Released for Sudo chroot Flaw Allowing Local Privilege Escalation | 0 user ratings | 2025-10-14 08:31:47 By: milo |
| Threat Actors Exploit ScreenConnect to Gain Unauthorized Remote Access | 0 user ratings | 2025-10-14 07:53:54 By: milo |
| Ivanti Patches 13 Endpoint Manager Flaws Allowing Remote Code Execution | 0 user ratings | 2025-10-14 06:43:31 By: milo |
| TA585 Deploys Novel Web-Injection to Deliver MonsterV2 Malware on Windows | 0 user ratings | 2025-10-14 06:08:19 By: milo |
| Elastic Cloud Enterprise Flaw Lets Attackers Run Malicious Commands | 0 user ratings | 2025-10-14 05:58:32 By: milo |
| 178,000+ Invoices Expose Customer Data from Invoicely Platform | 0 user ratings | 2025-10-14 05:50:05 By: milo |
| Simple Prompt Injection Lets Hackers Bypass OpenAI Guardrails Framework | 0 user ratings | 2025-10-14 05:23:17 By: milo |
| Clevo UEFI Leak Allows Signing of Malicious Firmware with BootGuard Keys | 0 user ratings | 2025-10-14 04:58:13 By: milo |
| Fancy making millions hacking Apple? iPhone maker now offers huge bug bounty worth up to $2m - TechRadar | 0 user ratings | 2025-10-13 18:17:50 By: milo |
| OSINT: Finding Surveillance Cameras with Overpass Turbo | 0 user ratings | 2025-10-13 14:14:10 By: milo |
| Russian Cybercrime Marketplace Shifting from RDP Access to Malware Stealer Log Exploits | 0 user ratings | 2025-10-13 13:41:04 By: milo |
| Hackers Target macOS Users with Fake Homebrew Websites to Deliver Malicious Payloads | 0 user ratings | 2025-10-13 13:09:42 By: milo |
| Pro-Russian Hacktivist Targets OT ICS Systems to Harvest Credentials | 0 user ratings | 2025-10-13 12:42:37 By: milo |
| Axis Communications Vulnerability Exposes Azure Storage Credentials | 0 user ratings | 2025-10-13 12:14:33 By: milo |
| EDR-Freeze: Technical Mechanics and Forensic Artifacts Exposed | 0 user ratings | 2025-10-13 11:46:27 By: milo |
| Hackers Exploit Microsoft Edge s Internet Explorer Mode to Compromise User Devices | 0 user ratings | 2025-10-13 11:18:04 By: milo |
| North Korean Hackers Target Developers with 338 Malicious Software Packages | 0 user ratings | 2025-10-13 10:32:04 By: milo |