1
Cybersecurity News
•
2 hours ago
Gaming peripheral manufacturer Endgame Gear has confirmed that hackers successfully compromised its official software distribution system, using the company’s OP1w 4K V2 mouse configuration tool to spread dangerous Xred malware to unsuspecting customers for nearly two weeks. The security breach, which occurred between June 26 and July 9, 2025, represents a troubling example of supply […]
2
GB Hackers
•
55 minutes ago
Hackers Exploit Official Gaming Mouse Software to Spread Windows-based Xred Malware
Gaming peripheral manufacturer Endgame Gear has disclosed asecurity incidentinvolving malware-infected software distributed through their official website, affecting users who downloaded the OP1w 4k v2 mouse configuration tool between June 26 and July 9, 2025.
The company has issued an urgent security advisory and implemented immediate remediation measures while the investigation into the breach continues.
Key Ta
3
GB Hackers
•
3 hours ago
Microsoft Investigates Leak in Early Warning System Used by Chinese Hackers to Exploit SharePoint Vulnerabilities
Chinese laws requiring vulnerability disclosure to the government create transparency issues and potential conflicts for international cybersecurity efforts.
Microsoft is probing whether a leak from its confidential early warning system enabled Chinese state- hackers to exploit significant flaws in its SharePoint software, leading to breaches at over 400 organizations, including the
4
Cybersecurity News
•
48 minutes ago
Docker monitoring is the process of keeping tabs on the functionality, state, and resource usage of Docker containers as well as the entire Docker ecosystem. With the help of the well-known containerization technology Docker, programmers may bundle their apps and their dependencies into independent, lightweight containers that can function reliably in various computing environments. To […]
5
Cybersecurity News
•
5 hours ago
Microsoft Corp. is investigating whether a leak from its Microsoft Active Protections Program (MAPP) enabled Chinese state- hackers to exploit critical SharePoint vulnerabilities before patches were fully deployed, according to sources familiar with the matter. The investigation comes as cyber espionage attacks have compromised more than 400 organizations worldwide, including the U.S. National Nuclear Security […]