Latest Articles

Warning for WordPress Admins – Fake SEO Plugins Hijacking Websites

A new wave of SEO spam attacks is exploiting a deceptively simple yet effective tactic: disguising malicious plugins by naming them after the target...

Apache APISIX Flaw Enables Unauthorized Cross-Issuer Access Due to Misconfigurations

A vulnerability tracked as CVE-2025-46647 has been discovered in the OpenID Connect plugin of Apache APISIX, an open-source API gateway widely used for managing...

Instagram Adopts Daily TLS Certificate Rotation with One-Week Validity

Instagram has adopted an unconventional approach to web security by rotating its TLS (Transport Layer Security) certificates daily, using certificates that are set to...

Critical Next.js Cache Poisoning Flaw Triggers Denial of Service Attacks

A security vulnerability, identified as CVE-2025-49826, has been discovered and patched in the popular React-based web framework Next.js.The flaw affects versions 15.1.0...

Critical Writable File in Lenovo’s Windows Directory Lets Attackers Bypass AppLocker

A recently highlighted security flaw on Lenovo machines has drawn attention to a lingering risk for organizations relying on Microsoft’s AppLocker to enforce application...
Scattered Spider

Scattered Spider Upgrades Tactics to Leverage Legitimate Tools for Detection Evasion and Persistence

The financially driven cybercriminal collective known as Scattered Spider, also known as UNC3944, Scatter Swine, and Muddled Libra, has been active since at least...

Severe Hikvision applyCT Flaw Allows Remote Code Execution on Devices

A newly discovered vulnerability in Hikvision’s widely used applyCT security management platform has put thousands of surveillance and monitoring infrastructures at risk, raising urgent...
Cloudflare Verification Screens

Hackers Exploit Fake Cloudflare Verification Screens to Trick Users into Installing Malware

Cybercriminals are leveraging a deceptive new technique involving fake Cloudflare verification screens to convince users to unwittingly install malware on their systems.This social...

Critical PHP Vulnerabilities Expose Systems to SQL Injection & DoS Attacks – Update Immediately

A newly disclosed security vulnerability (CVE-2025-1735) in the PHP pgsql extension has raised concerns among developers and system administrators.The flaw, rated as moderate...

Researchers Bypassed Content Security Policy using HTML-injection Technique

A recent security write-up has exposed a practical method for bypassing nonce-based Content Security Policy (CSP) protections, challenging a key pillar of modern web...

Cyber Security Headlines

Cyber Attacks

Data Breach

Cyber AI