Unraveling Operation DupeHike: A Spear-Phishing Campaign A sophisticated spear-phishing campaign known as Operation DupeHike has been active since November 2025, targeting organizations with deceptive tactics. Seqrite...
Cyberattack on Poland’s Power Grid Linked to Russian Hacking Group Sandworm In a recent cyberattack on Poland’s power grid in late December 2025, the Russian state-sponsored...
Konni Hackers Target Blockchain Engineers with AI-Generated Malware The North Korean hacker group known as Konni, also identified as Opal Sleet and TA406, has been utilizing...
Malicious AI Code Extensions in VSCode Marketplace Steal Developer Data Recently, two malicious extensions in Microsoft’s Visual Studio Code (VSCode) Marketplace, collectively installed 1.5 million times,...
The Rise of Voice Phishing Attacks Targeting SSO Accounts In recent times, the ShinyHunters extortion gang has claimed responsibility for a series of voice phishing attacks...
Protecting Against Ransomware Attacks: A Comprehensive Guide One of the key challenges with ransomware encryption is the failure to write the encrypted temporary key to the...
The Impact of AI-Generated Code on Security: A Real-World Case Study Utilizing AI models to assist in coding has become a common practice in modern development...
The End of curl’s Bug Bounty Program curl, the popular command-line utility and library, has decided to terminate its HackerOne security bug bounty program due to...
into plain text. The vulnerabilities in the Bluvoyix platform of Bluspark Global could have allowed a bad actor to gain full control of the platform and...
Ring has recently introduced a new tool called Ring Verify, which aims to ensure the authenticity of Ring videos by confirming that they have not been...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.