Home 2017-08-28T17:57:09+05:30

Legacy Python Bugs Enable PyPI Attacks via Domain Hijack

Hidden vulnerabilities in old Python code can create serious risks for today’s development environments. A recent example involves legacy bootstrap scripts used by the zc.buildout tool. These outdated scripts still [...]

Microsoft Teams Guest Chat Risk Lets Attackers Bypass Security

A gap in Microsoft Teams’ B2B guest access allows attackers to bypass Defender for Office 365 protections, creating unprotected spaces for phishing and malware. This issue, highlighted by Ontinue, comes [...]

Threat Actors List iOS 26 Full-Chain 0-Day on Dark Web

A threat actor calling themselves ResearcherX has claimed to sell a full-chain zero-day exploit for Apple’s new iOS 26. The listing, posted on a major dark web marketplace, says the [...]

Malware in Chrome Extension Found Stealing SOL via Hidden Swap Fees

Security researchers at Socket discovered a deceptive Chrome extension called Crypto Copilot. It pretends to be a legitimate Solana trading tool but secretly takes SOL from users’ swap transactions. The [...]

Tor Enhances Security with Galois Encryption

The Tor Project has introduced a major upgrade to its cryptographic system, replacing its long-standing relay encryption algorithm with the new Counter Galois Onion (CGO) design. CGO is a research-backed [...]

Subscribe to our newsletter to receive security tips everday!