Home

Microsoft Detects Malicious Next.js Repos Used in Live Attack Campaigns

Microsoft says attackers are creating fake Next.js projects to trick developers. These projects look normal and often appear as job assignments or coding tests. But once a developer opens or [...]

AI Tools Help Hacker Breach 600+ FortiGate Devices

A financially motivated threat actor used commercial generative AI tools to compromise more than 600 FortiGate devices across 55 countries. According to Amazon Threat Intelligence, the activity took place between [...]

ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools

ZeroDayRAT is a newly discovered mobile spyware service that targets both Android and iOS devices. Unlike traditional malware that focuses only on spying or financial theft, this tool combines both [...]

Google Blocks 1.75 Million Harmful Apps from Play Store in 2025

Google says it stopped more than 1.75 million malicious or policy-violating Android apps from reaching users in 2025. Over 80,000 developer accounts were also banned to prevent repeat abuse. The [...]

PayPal Data Exposure: Six Months of User Information Leaked Online

Software Error in Business Loan Application PayPal has notified a small group of customers about a cybersecurity incident that exposed personal data for almost six months. The issue was traced [...]

Subscribe to our newsletter to receive security tips everday!