Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Security Affairs
securityaffairs.com
Read, think, share … Security is everyone's responsibility
North Korean threat
actors
use JSON sites to deliver malware via
trojanized
code
securityaffairs.com
·
26w
RondoDox
expands botnet by exploiting XWiki RCE bug left
unpatched
since February 2025
securityaffairs.com
·
26w
Five
admit
helping North Korea
evade
sanctions through IT worker schemes
securityaffairs.com
·
26w
SECURITY
AFFAIRS
MALWARE
NEWSLETTER ROUND 71
securityaffairs.com
·
26w
Security Affairs newsletter Round 550 by
Pierluigi
Paganini
– INTERNATIONAL EDITION
securityaffairs.com
·
26w
Anthropic: China-backed
hackers
launch first large-scale autonomous AI
cyberattack
securityaffairs.com
·
26w
Multiple
Vulnerabilities
in
GoSign
Desktop lead to Remote Code Execution
securityaffairs.com
·
26w
U.S. CISA adds
Fortinet
FortiWeb
flaw to its Known Exploited Vulnerabilities catalog
securityaffairs.com
·
26w
Critical CVE-2025-59367 flaw lets hackers access ASUS
DSL
routers
remotely
securityaffairs.com
·
26w
Millions of sites at risk from
Imunify360
critical
flaw
exploit
securityaffairs.com
·
26w
Critical
FortiWeb
flaw under attack, allowing complete
compromise
securityaffairs.com
·
26w
Germany’s
BSI
issues guidelines to counter
evasion
attacks targeting LLMs
securityaffairs.com
·
26w
Washington Post
notifies
10,000
individuals
affected in Oracle-linked data theft
securityaffairs.com
·
26w
Chrome extension “
Safery
” steals Ethereum wallet seed
phrases
securityaffairs.com
·
26w
A new round of Europol’s Operation Endgame
dismantled
Rhadamanthys
, Venom RAT, and Elysium botnet
securityaffairs.com
·
26w
U.S. CISA adds WatchGuard
Firebox
, Microsoft Windows, and Gladinet
Triofox
flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com
·
26w
Amazon alerts: advanced threat actor exploits Cisco ISE &
Citrix
NetScaler
zero-days
securityaffairs.com
·
26w
Google sues
cybercriminal
group
Smishing
Triad
securityaffairs.com
·
26w
New
Danabot
Windows version appears in the threat landscape after May
disruption
securityaffairs.com
·
26w
Australia’s
spy
chief warns of China-linked
threats
to critical infrastructure
securityaffairs.com
·
26w
« Page 38
·
Page 40 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help