Pocket Card Users Under AttackIn early March 2025, a sophisticated phishing wave emerged that specifically targets Pocket Card users. Although some recipients dismissed the initial emails as spam, many unsuspecting...
Read moreDetailsCybercriminals continue to refine their methods for delivering malware payloads, using clandestine techniques that make detection more challenging. Recently, analysts uncovered how the XLoader malware is spread through compromised ZIP...
Read moreDetailsCVE exploits in 2024 have seen a significant rise, with 768 vulnerabilities actively exploited, marking a 20% increase from 2023. This surge highlights a growing trend in cybercriminal activities, where...
Read moreDetailsCybercriminals have found new ways to compromise Microsoft 365 accounts, using Go Resty and Node Fetch to automate password spraying attacks. These open-source tools, originally intended for web development, allow...
Read moreDetailsThis content is for educational purposes only. Please test only your own hardware and infrastructure—using these methods elsewhere is illegal. Don’t be a “skid” who randomly exploits devices and networks....
Read moreDetailsA new AI chatbot named GhostGPT is making waves on cybercrime forums, providing criminals with a powerful tool to create malware, launch phishing campaigns, and develop sophisticated exploits. Unlike familiar...
Read moreDetailsCybersecurity researchers have uncovered a series of attacks on PHP servers driven by Python-based bots. These bots often rely on GSocket, an open-source tool, to bypass network boundaries and maintain...
Read moreDetailsThe US Department of Justice has taken down Rydox, a notorious cybercrime marketplace dealing in stolen personal data. Authorities arrested three suspected administrators and seized both the website’s domain and...
Read moreDetailsCybersecurity firm Horizon3.ai has uncovered three serious SimpleHelp vulnerabilities that put both servers and client machines at risk. SimpleHelp is a remote access and support solution used by many organizations...
Read moreDetailsRecent research reveals severe tunneling protocol vulnerabilities that leave over 4.2 million hosts exposed to cyber threats. These include VPN servers, ISP routers, mobile gateways, and CDN nodes. China, France,...
Read moreDetails