Blogs
Find the latest blog’ posts:
- by Deeba AhmedA new campaign by the Russian-linked group APT28, called Op Neusploit, exploits a Microsoft Office flaw to steal emails for remote control of devices in Ukraine, Slovakia, and Romania.
- by Deeba AhmedMoltbook is a new social platform where AI agents post and interact while humans observe, raising questions about autonomy, security, and agent behavior.
- by WaqasEverest ransomware claims a breach involving legacy Polycom systems later acquired by HP Inc., alleging the theft of 90GB of internal data.
- by Deeba AhmedA multi-stage phishing campaign is targeting business users by exploiting Vercel cloud storage, PDF attachments, and Telegram bots to steal Dropbox credentials.
- by WaqasA months-long breach allowed Chinese State-sponsored hackers to hijack Notepad++ updates in 2025, exposing users to malware via a compromised hosting provider.
- by Deeba AhmedIvanti has disclosed two critical remote code execution (RCE) flaws (CVE-2026-1281 & CVE-2026-1340) in its EPMM software.
- by Deeba AhmedSpotify and the Big Three labels have filed a record-breaking $13 trillion lawsuit against Anna’s Archive over a massive music data scrape. Find out what this means for the future of digital music.
- by Deeba AhmedWe usually think of computer viruses as silent, invisible programs running in the background, but a worrying discovery shows that modern hackers are getting much more personal.
- by Deeba AhmedUS authorities take control of over $400 million in crypto, cash, and property tied to Helix, a major darknet bitcoin mixing service used by drug markets.
- by Deeba AhmedA 38 year old was convicted on seven counts of economic espionage and seven counts of theft of trade secrets following an 11 day trial.
Guest Blogs
Post your insights, hacking experiences, and comments here:
