CSS exploits in emails are tracking your actions and data.

CSS exploits in emails are tracking your actions and data.

Introduction Cybercriminals have found a new way to sneak past email filters and secretly monitor user actions by misusing basic CSS exploits. CSS, a tool normally used to add style and structure to web pages, is now being manipulated in emails to hide extra content and gather details about the…


0 Comments4 Minutes

New Phishing Scam Poses as Booking.com to Steal info

Microsoft has uncovered an ongoing Phishing Attack that targets the hospitality industry by posing as the online travel platform Booking.com. The attack, tracked under the name Storm-1865, began in December 2024 and aims to commit financial fraud and data theft. You might be interested in:…


0 Comments6 Minutes

How SSRF Exploits Can Steal Your Data

How SSRF Exploits Can Steal Your Cloud Credentials and Sensitive Data

Coordinated SSRF Exploits on Multiple Platforms A cybersecurity warning has been issued by threat intelligence company GreyNoise about a recent spike in SSRF Exploits targeting Server-Side Request Forgery (SSRF) vulnerabilities. On March 9, 2025, the company detected over 400 IP addresses actively…


0 Comments3 Minutes

Your Router Might Be Infected by Ballista Botnet

Your Router Might Be Infected by Ballista Botnet

Overview A new botnet, known as Ballista, is now attacking TP-Link Archer routers that haven’t been updated. According to researchers at Cato CTRL, the botnet takes advantage of a serious flaw (CVE-2023-1389) in these devices. This weakness lets hackers send commands to the router remotely, putting…


0 Comments3 Minutes

Fake Browser Extensions That Steal Login Info

Fake Browser Extensions That Steal Login Info

Fake Browser Extensions Cybersecurity experts have revealed a new way hackers can use Fake Browser Extensions to impersonate legitimate ones, tricking users into giving away their login details. You might be interested in: This PolarEdge Trojan Turns Devices Into Remote Attack Tools According to a…


0 Comments2 Minutes

Elastic Security Update for Kibana

Urgent Security Update for Kibana

What Happened Elastic has released an important security update for Kibana, the dashboard tool used with Elasticsearch. A dangerous bug was found that could let attackers run harmful code. This bug, identified as CVE-2025-25012, is linked to a problem called prototype pollution. With a very high…


0 Comments3 Minutes

Malicious Go Modules: Trojan Threats Targeting Linux and macOS Computers

Malicious Go Modules: Trojan Threats Targeting Linux and macOS Computers

Overview Security experts have uncovered a significant cyber threat aimed at the Go programming community. Recent investigations reveal that several fake Go modules, posing as popular Go libraries, are being used to infect Linux and macOS systems with loader malware. This ongoing campaign targets…


0 Comments5 Minutes

Brute-Force Assault on 4K ISPs | Double-Check Your Passwords

Brute-Force Assault on 4K ISPs | Double-Check Your Passwords

A group of unknown cybercriminals has been targeting internet service providers in China and on the West Coast of the United States. Their goal is to infect systems with malware that steals data and mines cryptocurrency. These operations have been uncovered by researchers at the Splunk Threat…


0 Comments3 Minutes

This PolarEdge Trojan Turns Devices Into Remote Attack Tools

This PolarEdge Trojan Turns Devices Into Remote Attack Tools

Overview of the Attack A new botnet, named "PolarEdge," has been identified as targeting devices from brands like Cisco, ASUS, QNAP, and Synology since late 2023. French cybersecurity company Sekoia recently uncovered the threat, which is exploiting a critical vulnerability (CVE-2023-20118)…


0 Comments5 Minutes

This Ransomware Gang Could Lock Your Files and Steal Millions

This Black Basta Ransomware Locks Your Files and Steals Millions

A massive leak of internal chat logs from the notorious ransomware group Black Basta has exposed their operations, internal conflicts, and tactics. The logs, spanning over a year, were published online, offering a rare glimpse into the workings of one of the most dangerous cybercriminal groups. You…


0 Comments4 Minutes