News

News

Phishing-as-a-service operation uses DNS-over-HTTPS for evasion

A newly discovered phishing-as-a-service (PhaaS) operation that researchers call Morphing Meerkat, has been using the DN...
News

New Ubuntu Linux security bypasses require manual mitigations

Three security bypasses have been discovered in Ubuntu Linux’s unprivileged user namespace restrictions, which could be ...
News

Oracle Health breach compromises patient data at US hospitals

A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient ...
News

Hijacked Microsoft web domain injects spam into SharePoint servers

The legacy domain for Microsoft Stream was hijacked to show a fake Amazon site promoting a Thailand casino, causing all ...
News

Infostealer campaign compromises 10 npm packages, targets devs

Ten npm packages were suddenly updated with malicious code yesterday to steal environment variables and other sensitive ...
News

Chinese FamousSparrow hackers deploy upgraded malware in attacks

A China-linked cyberespionage group known as 'FamousSparrow' was observed using a new modular version of its signature b...
News

The 4 WordPress flaws hackers targeted the most in Q1 2025

A new report sheds light on the most targeted WordPress plugin vulnerabilities hackers used in the first quarter of 2025...
News

Mozilla warns Windows users of critical Firefox sandbox escape flaw

Mozilla has released Firefox 136.0.4 to patch a critical security vulnerability that can let attackers escape the web br...
News

Vivaldi integrates Proton VPN into the browser to fight web tracking

Vivaldi has announced the integration of Proton VPN directly into its browser without requiring add-on downloads or plug...
News

Dozens of solar inverter flaws could be exploited to attack power grids

Dozens of vulnerabilities in products from three leading makers of solar inverters, Sungrow, Growatt, and SMA, could be ...