Security
Headlines
HeadlinesLatestCVEs

Tag

#git

An $8.4 Billion Chinese Hub for Crypto Crime Is Incorporated in Colorado

Before a crackdown by Telegram, Xinbi Guarantee grew into one of the internet’s biggest markets for Chinese-speaking crypto scammers and money laundering. And all registered to a US address.

Wired
#web#mac#git#intel
Roblox Lawsuit Claims Hidden Tracking Used to Monetize Kids Data

Roblox hit with class action over alleged secret tracking of kids’ data; lawsuit claims privacy law violations and…

Practical Ways to Improve Your Digital Efficiency

Optimizing your online productivity is more important than ever. Whether you’re a business owner, freelancer, or simply someone…

Anonymous Hackers Steal Flight Data from US Deportation Airline GlobalX

A hacker group claiming affiliation with Anonymous says it breached GlobalX Airlines, leaking sensitive flight and passenger data…

GHSA-2487-9f55-2vg9: OZI-Project/ozi-publish Code Injection vulnerability

### Impact Potentially untrusted data flows into PR creation logic. A malicious actor could construct a branch name that injects arbitrary code. ### Patches This is patched in 1.13.6 ### Workarounds Downgrade to <1.13.2 ### References * [Understanding the Risk of Script Injections](https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#understanding-the-risk-of-script-injections)

FakeUpdates, Remcos, AgentTesla Top Malware Charts in Stealth Attack Surge

Check Point’s April 2025 malware report reveals increasingly sophisticated and hidden attacks using familiar malware like FakeUpdates, Remcos,…

Zero Trust in the Age of Digital Transformation: The New Cybersecurity Paradigm

With the digital transformation movement sweeping the world and cyber threats evolving simultaneously to pose greater and greater…

The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That

Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the equation—is what happens after detection. New research from GitGuardian's State of Secrets Sprawl 2025 report reveals a disturbing trend: the vast majority of exposed company secrets discovered in public repositories remain valid for years after detection, creating an expanding attack

Deepfakes, Scams, and the Age of Paranoia

As AI-driven fraud becomes increasingly common, more people feel the need to verify every interaction they have online.

New SEO Poisoning Campaign Targeting IT Admins With Malware

Varonis reveals attackers are using SEO poisoning to trick IT admins into downloading malware, alongside a critical root…