Ultime news
PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem
Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients
ChatGPT, will it be your new life companion? Humans are saying goodnight to AI
DeepSeek launches version 3.1 of its AI model with support for Chinese chips
Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app
Can a file name compromise a Linux system? Chinese hackers say so
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeThis article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable for its ability to generate…
CybercrimeA new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple’s WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers to execute arbitrary code on…
CybercrimeWhen it comes to cybersecurity, it’s easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that a vulnerability is always around…
CybercrimeFraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that require no experience , scammers…
CybercrimeThe cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…

