Hackers Exploit New QuirkyLoader Malware to Deploy Agent Tesla, AsyncRAT, and Snake Keylogger

ybersecurity experts have recently uncovered a new malware loader, dubbed QuirkyLoader, that has been actively [...]

Password Managers Exposed to Clickjacking Threats: Research Reveals Vulnerabilities

A recent study has uncovered that many popular password managers are at risk of clickjacking [...]

Colt Confirms Possible Customer Data Breach After Cyber Attack

Colt Technology Services has acknowledged that sensitive customer data may have been accessed and is [...]

Cybercriminals Exploit ClickFix Tactic and Fake CAPTCHA Pages to Deploy CORNFLAKE.V3 Backdoor

Cybercriminals continue to refine their social engineering tactics, with recent campaigns leveraging fake CAPTCHA pages [...]

Google Reaches $30 Million Settlement in YouTube Child Privacy Case

August 21, 2025 – Google has agreed to a $30 million settlement in the United [...]

GPT-5 Faces Vulnerability: Router Can Redirect Queries to Older, Less Secure Models

A newly discovered vulnerability in GPT-5 could redirect user queries from the advanced GPT-5 Pro [...]

Inotiv Confirms Ransomware Attack Affecting Key Systems and Data

Inotiv, a pharmaceutical research company based in Indiana, has confirmed that it suffered a ransomware [...]

UAE-Based Startup Offers Up to $20 Million for Zero-Day Exploits Targeting Smartphones

A new cybersecurity startup based in the United Arab Emirates, Advanced Security Solutions, has entered [...]

PromptFix Exploit: How AI Browsers Are Being Tricked into Hidden Malicious Actions

Cybersecurity researchers have uncovered a novel attack method known as PromptFix, a prompt injection exploit [...]

Mule Operators in META Region Evolve Into Complex Fraud Networks

Fraud activity across the Middle East, Turkey, and Africa (META) is entering a new phase [...]