Google Launches OSS Rebuild to Detect Malicious Code in Popular Open-Source Software
Google has unveiled a new initiative called OSS Rebuild, aimed at strengthening the security of open-source package ecosystems and defending against software supply chain attacks. “As supply chain attacks increasingly [...]
New DCHSpy Malware Targets Android: Steals WhatsApp Data, Call Logs, and More
"A New DCHSpy Variant Unveiled: Iranian Cyber Group MuddyWater Targets Mobile Data Amid Rising Israel-Iran Tensions" This advanced version of the DCHSpy Android surveillance tool, deployed just a week after [...]
CoinDCX Hack: $44.2 Million Drained from the Platform
On July 19, 2025, CoinDCX, India's second-largest cryptocurrency exchange, confirmed a sophisticated security breach that led to the theft of approximately $44.2 million from its platform. This major cyberattack adds [...]
CISA Issues Three ICS Advisories Addressing Vulnerabilities and Exploitation Risks
On July 17, 2025, CISA released three important advisories concerning Industrial Control Systems (ICS), targeting critical vulnerabilities in energy monitoring, healthcare imaging, and access control technologies. The advisories warn of [...]
Google’s AI tool Big Sleep has discovered a critical zero-day vulnerability in SQLite and has successfully blocked its active exploitation
Google’s cutting-edge AI-driven security tool, Big Sleep, has reached a major milestone by identifying and halting the exploitation of a critical SQLite 0-day vulnerability, making it the first instance where [...]





Get Social