A 45 day assessment of internal tools reveals that trusted utilities like PowerShell and WMIC are used in 84% of high severity incidents, shifting security focus from malware to over entitlement.
Attackers can exploit unsafe class loading in the Redshift JDBC driver by supplying a crafted database URL, leading to full…
TeamPCP's TanStack npm supply chain attack compromised two OpenAI employee workstations, prompting certificate rotation and urgent macOS app update requirements.
Attackers exploited a legitimate HPE monitoring tool for over 100 days, pushing malicious scripts through a trusted management channel without…
The OrBit rootkit, based on the open source Medusa project, has evaded detection for years by hooking over forty system…
Cybercriminals are using Microsoft's OAuth device authorization flow to steal authentication tokens through phishing campaigns that bypass traditional security tools.
Gunra ransomware has grown from a regional threat into a global RaaS operation with 32 confirmed victims and no restrictions…
Administrators must urgently patch newly disclosed cPanel flaws that grant unauthenticated access to sensitive system resources across shared hosting environments.
OpenAI disclosed a supply chain breach affecting two employee devices via the TanStack attack, requiring macOS users to update ChatGPT…
A scan of a million self-hosted AI services found widespread misconfiguration, with many systems exposed without any authentication, leaving sensitive…
Three newly published versions of the Node IPC npm package contain a stealthy backdoor that exfiltrates developer credentials across 90 categories to an external server.
Microsoft warns customers that attackers are actively exploiting a high-severity cross-site scripting flaw in on-premises Exchange Server via malicious email…
CISA mandates federal agencies patch a critical Cisco SD WAN authentication bypass by May 17 as threat actors exploit the…
Attackers can exploit a Server-Side Request Forgery flaw in self-hosted Next.js to bypass firewalls and steal IAM credentials and API…
The TencShell framework repurposes open source Rshell code and uses Tencent style API traffic to hide its command and control communications from security tools.
Microsoft warns that attackers are exploiting a critical cross site scripting flaw in Exchange Server's Outlook Web Access to perform network level spoofing attacks on on premises systems.
The malware has evolved from a standard backdoor into a modular ecosystem targeting government and diplomatic organizations across Europe and Central Asia.
The FrostyNeighbor hacking group targets Ukrainian government organizations with spearphishing emails and server side filtering before abusing Windows Scheduled Tasks to maintain persistent access on compromised systems.
The flaw gives unauthenticated attackers full administrative control over enterprise SD-WAN infrastructure without any valid credentials.
Researchers detail a months-long espionage operation where an APT group exploited an Exchange server flaw to breach an Azerbaijani energy…
Google's Chrome 148 update patches 79 security flaws, including 14 critical bugs that could allow remote code execution through malicious…
Chaotic Eclipse reveals two zero day flaws, one bypassing BitLocker encryption via the Windows Recovery Environment and another elevating privileges…
Attackers began probing PraisonAI deployments within hours of the advisory, scanning for the exposed /agents and /chat endpoints on internet…
Palo Alto Networks warns of active exploitation of a PAN-OS remote code execution vulnerability by state-sponsored actors, with patches expected…
Sign in to your account