Skip to content A skeleton key for hackers The publicly available exploits provide a near-universal way to bypass key protections. […]
Category: exploits
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
May 20, 2025Ravie LakshmananMalware / Cloud Security A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud […]
Jury orders NSO to pay $167 million for hacking WhatsApp users
A jury has awarded WhatsApp $167 million in punitive damages in a case the company brought against Israel-based NSO Group […]
“The girl should be calling men.” Leak exposes Black Basta’s influence tactics.
A leak of 190,000 chat messages traded among members of the Black Basta ransomware group shows that it’s a highly […]