
Elvis Emeka Ikeji
Cybercriminals Exploit Google Forms for Crypto-Theft Scheme
Google Forms, known for its seamless data collection, has unexpectedly become a launchpad for a fast-moving crypto-phishing campaign.
Fir...
Android Malware Targets Credit Cards
Malicious banking apps can drain your funds, monitor calls and messages, and secretly track your device activity.
Most people checking th...
EAGLET Backdoor Targets Russian Aerospace in Cyber Spy Campaign
Russian aerospace and defense sectors have come under a cyber espionage campaign that uses a backdoor named EAGLET to steal sensitive data.
...TP-Link NVR Flaws Enable Remote Command Execution
Two serious security flaws CVE-2025-7723 and CVE-2025-7724 have been discovered in TP-Link's VIGI network video r...
Russian Hackers suspected to Be Behind Dutch Judicial System Compromise
Russian-affiliated hackers are suspected of carrying out a cyberattack that may have compromised Dutch criminal case records. The breach reportedly...
Hidden Malware Discovered in WordPress Must-Use Plugins Directory
Security researchers at Sucuri have identified a new stealth backdoor hidden within WordPress’s "mu-plugins" directory that allows attackers to m...
ToolShell Breach Hits Hundreds of SharePoint Servers, U.S. Agencies Exposed
A recent wave of zero-day attacks dubbed ToolShell has exposed critical vulnerabilities in Microsoft SharePoint Server, affecting hundreds of organ...
Cisco Confirms Ongoing Exploits Targeting ISE and ISE-PIC Vulnerabilities
Cisco has issued a warning about active exploits targeting critical flaws in its Identity Services Engine (ISE) and ISE Passive Identity Connector ...
U.S. Nuclear Agency Breached in Microsoft SharePoint Cyberattacks
Unknown hackers have infiltrated the network of the National Nuclear Security Administration (NNSA) by exploiting a recently patched Microsoft Shar...