Tag: cybersecurity threats

A new report by Citizen Lab exposes how law enforcement agencies worldwide utilize the Webloc platform to monitor 500 million devices through harvested advertising data.
A critical Marimo RCE flaw CVE-2026-39987 was exploited within hours of disclosure, enabling unauthenticated shell access and rapid credential theft activity.

Microsoft Releases Security Updates For 59 Vulnerabilities Including Six Actively Exploited Zero Day Flaws

Microsoft releases security patches addressing 59 vulnerabilities across its products, including six zero day flaws actively exploited in real world attacks.

Transparent Tribe Uses AI To Mass Produce Malware In Campaign Targeting Government Entities

Transparent Tribe, also known as APT36, is using AI assisted coding tools to generate large volumes of malware implants targeting government organizations and diplomatic missions, according to Bitdefender research.

Malicious Laravel Packages On Packagist Deploy Cross Platform Remote Access Trojan

Security researchers discovered malicious Laravel related packages on Packagist that deploy a cross platform remote access trojan affecting Windows, macOS, and Linux systems.

Compromised dYdX npm And PyPI Packages Spread Wallet Stealers And Remote Access Malware

Cybersecurity researchers uncover a supply chain attack where compromised dYdX npm and PyPI packages distributed wallet-stealing malware and remote access trojans, exposing developers and crypto users to major risks.

GhostPoster Malware Campaign Exploits Firefox Add-Ons to Hijack Browsers

GhostPoster malware used 17 Mozilla Firefox add-ons to execute affiliate link hijacking, ad fraud, tracking injection, and remote code execution, affecting over 50,000 users.

National CERT Issues Advisory on New Malware Campaign Exploiting Fake CAPTCHA Verification Pages

National CERT has issued a cybersecurity advisory warning of a new malware campaign exploiting fake CAPTCHA verification pages. The attack uses PowerShell scripts to deliver malware, targeting users seeking free content. Learn how to protect your systems from this emerging threat.

Recent articles

spot_img