The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a serious warning about ongoing cyberattacks targeting SaaS infrastructures—highlighting a breach involving Commvault’s Metallic SaaS...
Editor’s pick
This week’s hottest
Account Takeover (User + Admin) Via Password Reset
Hello Everyone! I’m Hemant Patidar, Final Year B.Tech – Civil Engineering Student at SRMIST, Chennai. A Cyber Security Enthusiast, Security Engineer, and a Bug Bounty Hunter by night. Let’s start… While...
218 GitHub Repositories’ CI/CD Secrets Exposed: 5 Key Insights from the Coinbase Supply Chain Attack
💡 Introduction: The Growing Threat of Supply Chain Attacks In recent years, supply chain attacks have emerged as one of the most significant cybersecurity threats, targeting the interconnected ecosystems of software...
Subdomain Takeover
What is a subdomain? A domain name typically has two parts: The top-level domain (TLD) is the extension, such as .com or .org, and the second-level domain (SLD) is the unique part of the domain name, often a business or...
Hackers Use Polymorphic Extensions to Hijack Browser Add-Ons & Steal Data
Introduction Cybersecurity researchers have uncovered a highly sophisticated attack technique that enables malicious browser extensions to impersonate any installed add-on. This novel approach, referred to as a...













