Microsoft Warns Silk Typhoon Hackers Target IT Supply Chain via Cloud
Microsoft says Silk Typhoon is now targeting remote management tools and cloud apps for access, showing a wide and fast exploitation strategy. Since late 2024, Silk Typhoon has been using [...]
LummaStealer Threat Hidden in Fake CAPTCHAs: Silent Installation Alert
Cybersecurity researchers at G DATA have discovered a new malware campaign using fake booking websites to spread LummaStealer malware via fake CAPTCHA prompts. This shift in distribution, found in January [...]
Cisco Webex for BroadWorks Flaw Could Expose User Credentials
Cisco has disclosed a vulnerability in Webex for BroadWorks that could let attackers intercept user credentials and data in certain setups. The issue, tracked as CSCwo20742, affects Release 45.2 on [...]
10,000+ WordPress sites exposed by donation plugin vulnerability
A serious flaw in the popular GiveWP Donation Plugin has put over 10,000 WordPress sites at risk of remote code execution since March 3, 2025. Known as CVE-2025-0912, this bug [...]
Google’s Email Shield hides your real email from apps
Google is developing Shielded Email, a tool that creates disposable email aliases to protect users’ real Gmail addresses when signing up for apps and services, helping to reduce spam. Discovered [...]