News

Leonidas Varagiannis (aka War), 21, and Prasan Nepal (aka Trippy), 20, the two alleged leaders of a child extortion group 764 ...
"TikTok infringed the GDPR regarding its transfers of EEA [European Economic Area] User Data to China and its transparency ...
Stealth malware MintsLoader delivers GhostWeaver RAT + Evades sandboxes using DGA + Powers data theft via encrypted C2 ...
Prompt injection flaws in Anthropic’s MCP and Google’s A2A protocols enable covert data exfiltration and AI manipulation.
NDR solutions uncover hidden threats missed by legacy tools by analyzing encrypted traffic, lateral movement, and blind spots ...
Backdoor plugin hijacks WordPress sites with admin access, stealth reinfection, and JS ad fraud—active since Jan 2025.
According to OX Security's 2025 Application Security Benchmark Report, a staggering 95–98% of AppSec alerts do not require ...
RomCom RAT uses bulletproof hosting and encrypted C2 for stealth; PRODAFT links it to Russian-speaking APT Nebulous Mantis.
"Brand new Microsoft accounts will now be 'passwordless by default,'" Microsoft's Joy Chik and Vasu Jakkal said. "New users ...
In an advisory issued on March 7, 2025, Commvault said it was notified by Microsoft on February 20 about unauthorized ...
Phishing attacks deliver DarkWatchman and Sheriff malware; targets span Russia, Ukraine, Baltics, with stealth and ...
Claude AI orchestrated 100 fake personas in global influence campaigns + enabled malware, scams, and brute-force attacks.