A 23 year old Canadian man has been arrested for operating the Kimwolf botnet, which infected unsecured devices like digital photo frames to launch massive DDoS attacks on global targets.
CISA adds two actively exploited flaws to its KEV catalog, including a critical Langflow vulnerability exploited by Iranian state hackers…
A legitimate signed Lenovo driver contains a security flaw that lets low privileged users terminate any process, including EDR and…
The FBI warns that the Kali365 phishing platform captures OAuth tokens through Microsoft's legitimate device code flow, allowing attackers to…
Microsoft is rolling out a change to Edge that prevents saved passwords from remaining in plaintext memory throughout the browsing…
Microsoft dismantled Fox Tempest, a malware signing service that used fraudulently obtained certificates to help cybercriminals bypass security controls.
Threat actors are actively exploiting a critical cPanel authentication bypass flaw to drop a cross-platform backdoor and steal credentials from…
A newly disclosed zero day in NGINX 1.31.0 exploits memory pool handling to bypass ASLR and achieve remote code execution,…
The financially motivated threat group has allegedly stolen 4,000 private repositories from GitHub's internal systems and is demanding payment for…
A single cached access key that arrived through normal behavior could have exposed nearly every critical workload in a company's…
A critical Drupal Core vulnerability allows unauthenticated SQL injection attacks on PostgreSQL sites, potentially leading to remote code execution and data exposure.
Researchers found millions of student records from Indian universities and EdTech firms being traded on cybercrime forums, enabling criminals to…
Storm 2949 gains persistent access through social engineering of Microsoft's self service password reset feature to exfiltrate data from cloud…
Flipper's new cyberdeck runs mainline Linux on a Rockchip RK3576 with modular expansion for SDR, storage, and cellular connectivity.
Seven country law enforcement operation seized 33 servers and thousands of user identities from a VPN service that openly catered to ransomware groups and other cybercriminals.
A phishing operation using fake event invitations and a repeatable automated framework has been targeting U.S. education, banking, government, technology, and healthcare organizations since December 2025.
The DirtyDecrypt flaw in the Linux kernel's AFS networking layer lets local attackers gain root by exploiting a missing copy-on-write guard during packet decryption.
The emergency update addresses 16 security issues including two critical flaws that could allow attackers to take control of affected systems through malicious web pages.
Malicious actors replaced Windows and Linux JDownloader installers with a Python based remote access Trojan after exploiting an unpatched CMS…
Microsoft released a mitigation for a BitLocker bypass that allows attackers with physical access to spawn an unrestricted shell and…
Two Microsoft Defender flaws are being exploited in the wild, allowing attackers to gain SYSTEM privileges or crash the antimalware…
GitHub confirmed a breach after a malicious Visual Studio Code extension compromised an employee device, leading to exfiltration of internal…
GhostTree exploits NTFS junctions to create recursive directory loops that trap EDR scanners in infinite traversal paths, leaving malicious files…
A SOCKS5 null-byte injection in Claude Code's network sandbox allowed attackers to exfiltrate credentials and source code for over five…
Sign in to your account