CyberGate CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
HUB access
CyberGate CyberGate
HUB access
CyberGate
  • Home 
  • Fact Checker 
  • Password Generator 
  • Password Leak Check 
  • TIL 
shape
shape
shape
shape

Latest cybersecurity news

  1. Home
  2. Page
Updated on December 13, 2023

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

March 11, 2026 No Comments

Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly

Read More »

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

March 11, 2026 No Comments

A threat actor known as UNC6426 leveraged keys stolen following the supply chain compromise of the nx npm package last year to completely breach a

Read More »

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

March 11, 2026 No Comments

Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to the threat actors. The Rust packages,

Read More »

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

March 10, 2026 No Comments

Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim

Read More »

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

March 10, 2026 No Comments

Cybersecurity researchers have discovered a new malware called KadNap that’s primarily targeting Asus routers to enlist them into a botnet for proxying malicious traffic. The

Read More »

New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

March 10, 2026 No Comments

Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run arbitrary SQL queries on victims’ databases and

Read More »
Load More