China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks on September 27, 2025 Posted by The Hacker News
New tool: convert-ts-bash-history.py, (Fri, Sep 26th) on September 26, 2025 Posted by SANS Internet Storm Center, InfoCON: green
Pointer leaks through pointer-keyed data structures on September 26, 2025 Posted by Google Project Zero
Posted in Hacking news Researchers Uncover Major Security Vulnerabilities in Industrial MMS Protocol Libraries on October 9, 2024 The Hacker News
Posted in Hacking news N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware on October 9, 2024 The Hacker News
Posted in Hacking news Social Media Accounts: The Weak Link in Organizational SaaS Security on October 9, 2024 The Hacker News
Posted in Hacking news Microsoft Issues Security Update Fixing 118 Flaws, Two Actively Exploited in the Wild on October 8, 2024 The Hacker News
Posted in Hacking news Microsoft Detects Growing Use of File Hosting Services in Business Email Compromise Attacks on October 8, 2024 The Hacker News
Posted in Hacking news Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively Exploited on October 8, 2024 The Hacker News
Posted in Hacking news Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines on October 8, 2024 The Hacker News
Posted in AI The AI Fix #19: AI spy specs, robot dogs with ladders, and is it AI or the climate? on October 8, 2024 Graham Cluley
Posted in Hacking news Cyberattack Group ‘Awaken Likho’ Targets Russian Government with Advanced Tools on October 8, 2024 The Hacker News