News

The goal is to steal large amounts of confidential data in an attempt to extort the victims. Here's how it works.
Several popular Chrome extensions send sensitive user data over unencrypted HTTP, exposing millions to interception and ...
Researchers have discovered and analyzed a ClickFix attack that uses a fake Cloudflare ‘humanness’ check. The Cloudflare ...
Hackers are actively exploiting CVE-2025-49113, a critical vulnerability in the widely used Roundcube open-source webmail ...
Threat actors are creating fake DocuSign and Gitcode websites The sites come with fake CAPTCHA and other scam mechanisms ...
A threat actor has been creating backdoored open source malware repositories to target novice cybercriminals and game cheaters.