Legacy Python Bugs Enable PyPI Attacks via Domain Hijack
Hidden vulnerabilities in old Python code can create serious risks for today’s development environments. A recent example involves legacy bootstrap scripts used by the zc.buildout tool. These outdated scripts still [...]
Microsoft Teams Guest Chat Risk Lets Attackers Bypass Security
A gap in Microsoft Teams’ B2B guest access allows attackers to bypass Defender for Office 365 protections, creating unprotected spaces for phishing and malware. This issue, highlighted by Ontinue, comes [...]
Threat Actors List iOS 26 Full-Chain 0-Day on Dark Web
A threat actor calling themselves ResearcherX has claimed to sell a full-chain zero-day exploit for Apple’s new iOS 26. The listing, posted on a major dark web marketplace, says the [...]
Malware in Chrome Extension Found Stealing SOL via Hidden Swap Fees
Security researchers at Socket discovered a deceptive Chrome extension called Crypto Copilot. It pretends to be a legitimate Solana trading tool but secretly takes SOL from users’ swap transactions. The [...]
Tor Enhances Security with Galois Encryption
The Tor Project has introduced a major upgrade to its cryptographic system, replacing its long-standing relay encryption algorithm with the new Counter Galois Onion (CGO) design. CGO is a research-backed [...]





Get Social