⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
Mon, 13 Oct 2025 18:48:00 +0530
Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors
Mon, 13 Oct 2025 15:42:00 +0530
Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor
Mon, 13 Oct 2025 15:24:00 +0530
Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns
Mon, 13 Oct 2025 12:22:00 +0530
New Rust-Based Malware "ChaosBot" Uses Discord Channels to Control Victims' PCs
Mon, 13 Oct 2025 10:42:00 +0530
New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login
Sun, 12 Oct 2025 22:54:00 +0530
Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts
Sat, 11 Oct 2025 19:00:00 +0530
Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
Sat, 11 Oct 2025 18:34:00 +0530
Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
Fri, 10 Oct 2025 19:55:00 +0530
Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries
Fri, 10 Oct 2025 19:01:00 +0530
From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
Fri, 10 Oct 2025 17:12:00 +0530
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
Fri, 10 Oct 2025 16:15:00 +0530
From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability
Fri, 10 Oct 2025 15:04:00 +0530
CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
Fri, 10 Oct 2025 12:11:00 +0530
From HealthKick to GOVERSHELL: The Evolution of UTA0388's Espionage Malware
Thu, 09 Oct 2025 22:49:00 +0530
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
Thu, 09 Oct 2025 21:00:00 +0530
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
Thu, 09 Oct 2025 19:18:00 +0530
ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More
Thu, 09 Oct 2025 17:46:00 +0530
From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine
Thu, 09 Oct 2025 14:40:00 +0530
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme
Thu, 09 Oct 2025 12:27:00 +0530
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
Wed, 08 Oct 2025 22:13:00 +0530
Share this story
Industry 4.0, the Fourth Industrial Revolution, and 4IR.
LEARN MOREThe key features and benefits of Endpoint Detection and Response (EDR).
LEARN MOREGoogle's global exhibition of inspiration, innovation, and education
LEARN MOREExplore how cutting-edge technologies empower business at the AWS Summit.
LEARN MORELeverage trends, strategies, and predictions to give your business a competitive edge.
LEARN MOREHow to scale from VMs to Kubernetes.
LEARN MORELet us know what you think about the article.