
Elvis Emeka Ikeji
Lenovo Firmware Flaws Enable Stealthy Implant Installs
Lenovo devices are impacted by multiple security vulnerabilities, including those that could enable attackers to install persistent implants on tar...
PyPI Alerts on Phishing Scam with Fake Emails and Clone Domain
Microsoft: macOS Sploitlight Bug Leaks Apple Intelligence Data
A recently patched vulnerability in macOS could have allowed attackers to bypass Transparency, Consent, and Control (TCC) protections and steal sen...
Hackers Hit Toptal GitHub, Push 10 Malicious npm Packages with 5K Downloads
In the latest example of a software supply chain attack, unknown threat actors gained unauthorized access to Toptal's GitHub organization account. ...
Amazon AI Coding Tool Hacked to Inject Data-Wiping Commands
A hacker inserted data-wiping code into Amazon's generative AI assistant, the Q Developer Extension for Visual Studio Code.
Amazon Q is a...
Hackers Hijack Gaming Mouse Software to Spread Xred Malware on Windows
Gaming accessory maker Endgame Gear has confirmed that its official software distribution system was breached, allowing hackers to spread Xred malw...
Cybercriminals Exploit Google Forms for Crypto-Theft Scheme
Google Forms, known for its seamless data collection, has unexpectedly become a launchpad for a fast-moving crypto-phishing campaign.
Fir...
Android Malware Targets Credit Cards
Malicious banking apps can drain your funds, monitor calls and messages, and secretly track your device activity.
Most people checking th...