مقالات

مقالات
Exploitation of TikTok for Malware Distribution: The Utilization of Vidar and StealC via ClickFix Methodology

The malware known as Latrodectus has recently adopted the ClickFix social engineering technique as a distribution method. The ClickFix approach…

مقالات
Cetus Protocol Cryptocurrency Heist Results in $223 Million Theft by Cybercriminals

The decentralized exchange Cetus Protocol has reported a significant breach, with hackers absconding with $223 million in cryptocurrency. In response…

مقالات
FBI Issues Alert on Luna Moth Ransomware Attacks Targeting Legal Firms

The FBI has issued a warning regarding an extortion group known as the Silent Ransom Group, which has been actively…

مقالات
ViciousTrap Exploits Cisco Vulnerability to Establish Global Honeypot Network Comprised of 5,300 Compromised Devices

Cybersecurity researchers have revealed that a threat actor, identified as ViciousTrap, has successfully compromised approximately 5,300 unique network edge devices…

مقالات
Critical Security Advisory: CVE-2025-4664 Vulnerability in Chrome Reveals Browser Activity on Windows and Linux Systems

A recently discovered zero-day vulnerability in Chrome, identified as CVE-2025-4664, has been found to compromise login tokens on both Windows…

مقالات
Significant Database Leak: 184 Million Records Reveal Extensive Collection of Login Credentials

The inadvertent exposure of data due to misconfigured or improperly secured databases represents a long-standing challenge in privacy and information…