
Malicious npm Package Impersonates Popular Nodemailer, Puts 3.9M Weekly Downloads at Risk of Crypto Theft
A sophisticated cryptocurrency theft scheme involving a malicious npm package that masquerades as the widely-used…
Critical ImageMagick Vulnerability Allows Remote Code Execution
A critical security vulnerability has been discovered in ImageMagick, the widely used open-source image processing software, that…
IBM Watsonx Vulnerability Enables SQL Injection Attacks
A critical vulnerability in the IBM Watsonx Orchestrate Cartridge for IBM Cloud Pak for Data has been…
Hackers Exploit macOS Security Features to Spread Malware
A growing wave of sophisticated attacks is turning macOS’s built-in security defenses into avenues for…
Fraudulent Scholarship Apps Target Students in “Defarud” Scam Campaign
An Android malware tracker named SikkahBot, active since July 2024 and explicitly targeting students in…
Salesforce Publishes Forensic Guide After Series of Cyberattacks
Salesforce has published a comprehensive forensic investigation guide aimed at empowering organizations to detect, analyze,…
Windows 11 25H2 Preview Build Released: Here’s What’s New
Microsoft has begun rolling out the Windows 11, version 25H2 (Build 26200.5074) preview to the…
Hackers Exploit Windows Defender Policies to Shut Down EDR Agents
Cybercriminals are now weaponizing Windows Defender Application Control (WDAC) policies to disable Endpoint Detection and…
Linux UDisks Daemon Vulnerability Lets Attackers Access Privileged User Files
Red Hat has disclosed a critical security flaw in the Udisks daemon that allows unprivileged…
APT Groups Weaponize Infostealer Malware in Precision Attacks
The cybersecurity landscape has witnessed a dangerous evolution as Advanced Persistent Threat (APT) groups increasingly…