Windows 11 feeling bloated? Sophia Script lets you reshape the OS from the inside out. Here's how it works.
Hackers are abusing the legitimate OAuth redirection mechanism to bypass phishing protections in email and browsers to take ...
American data analytics company LexisNexis Legal & Professional has confirmed to BleepingComputer that hackers breached its servers and accessed some customer and business information.
Researchers said a sophisticated exploit kit with 23 iOS vulnerabilities is being used by espionage and cybercrime campaigns.
Tycoon2FA has become a leading phishing-as-a-service (PhaaS) platforms, enabling campaigns that reach over 500,000 organizations monthly, prompting Microsoft’s Digital Crimes Unit (DCU) to work with ...
A critical-severity FreeScout vulnerability can be exploited for remote code execution without authentication or user interaction.
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users ...
APT28 exploited CVE-2026-21513, an MSHTML zero-day (CVSS 8.8), using malicious LNK files to bypass security controls and execute code.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results