A far-reaching espionage campaign targeting the American cybersecurity firm SentinelOne has been revealed as merely one chapter...
Security
The critical vulnerability CVE-2025-49113 in Roundcube—one of the world’s most widely adopted open-source webmail platforms—has been found...
A vulnerability in an outdated version of Google’s username recovery form allowed malicious actors to deduce a...
Following the April 2025 Windows security updates, users began to notice a curious anomaly — an empty...
Two malicious packages were recently discovered within the widely used JavaScript package registry, npm. Beneath their seemingly...
An increasing number of cybercriminals are shifting toward the use of so-called residential proxy networks, transforming ordinary...
As solar panels steadily become a fixture of daily life—enhancing energy resilience and reducing our carbon footprint—their...
A large-scale supply chain attack has been identified on the NPM platform: threat actors compromised 17 widely...
A newly modified strain of the Mirai botnet has weaponized the CVE-2024-3721 vulnerability found in TBK DVR-4104...
Operators of the Qilin ransomware group—also known under the alias Phantom Mantis—have begun actively exploiting critical vulnerabilities...
A new wave of cyberattacks has been recorded in Ukraine, targeting the destruction of critical infrastructure. At...
Even if you download applications exclusively from Google Play, this does not always guarantee safety—particularly when it...
At first glance, it appears to be nothing more than a routine security check. In reality, it...
New samples of PowerShell-based malware, representing an advanced evolution of the notorious data-stealer ViperSoftX, have begun circulating...