Home 2017-08-28T17:57:09+05:30

Threat Actors List iOS 26 Full-Chain 0-Day on Dark Web

A threat actor calling themselves ResearcherX has claimed to sell a full-chain zero-day exploit for Apple’s new iOS 26. The listing, posted on a major dark web marketplace, says the [...]

Malware in Chrome Extension Found Stealing SOL via Hidden Swap Fees

Security researchers at Socket discovered a deceptive Chrome extension called Crypto Copilot. It pretends to be a legitimate Solana trading tool but secretly takes SOL from users’ swap transactions. The [...]

Tor Enhances Security with Galois Encryption

The Tor Project has introduced a major upgrade to its cryptographic system, replacing its long-standing relay encryption algorithm with the new Counter Galois Onion (CGO) design. CGO is a research-backed [...]

W3 Total Cache PoC Published, Putting Millions of WordPress Sites at Risk

A proof-of-concept (PoC) exploit has been released for CVE-2025-9501, a critical command-injection vulnerability in W3 Total Cache, one of the most widely used caching plugins for WordPress. With over 1 [...]

Subscribe to our newsletter to receive security tips everday!