A race condition in the Linux kernel's ptrace logic allows local attackers to steal open file descriptors from privileged processes during shutdown.
The Cybersecurity Stars Awards 2026 will recognize organizations and individuals making meaningful contributions to security innovation, execution, and real-world impact.
Cyera researchers discovered four OpenClaw vulnerabilities that form an attack chain allowing data theft, privilege escalation, and persistent backdoor access.
Three newly published versions of the node-ipc npm package contain obfuscated malware that steals cloud credentials and exfiltrates data through…
Vercel's security update for Next.js and React Server Components addresses over a dozen vulnerabilities, including denial of service, middleware bypass,…
Attackers can leak heap memory or crash PHP servers by uploading specially crafted JPEG images to web applications that parse…
A compromised CMS flaw allowed attackers to replace JDownloader installers with a Python based RAT targeting Windows and Linux users.
The Tiny UDP Cannon vulnerability in Android 16 lets apps with basic permissions leak traffic past the VPN by exploiting…
A 45 day assessment of internal tools reveals that trusted utilities like PowerShell and WMIC are used in 84% of…
Attackers can exploit unsafe class loading in the Redshift JDBC driver by supplying a crafted database URL, leading to full…
TeamPCP's TanStack npm supply chain attack compromised two OpenAI employee workstations, prompting certificate rotation and urgent macOS app update requirements.
Attackers exploited a legitimate HPE monitoring tool for over 100 days, pushing malicious scripts through a trusted management channel without…
The OrBit rootkit, based on the open source Medusa project, has evaded detection for years by hooking over forty system…
Cybercriminals are using Microsoft's OAuth device authorization flow to steal authentication tokens through phishing campaigns that bypass traditional security tools.
Gunra ransomware has grown from a regional threat into a global RaaS operation with 32 confirmed victims and no restrictions on affiliate targeting.
Administrators must urgently patch newly disclosed cPanel flaws that grant unauthenticated access to sensitive system resources across shared hosting environments.
OpenAI disclosed a supply chain breach affecting two employee devices via the TanStack attack, requiring macOS users to update ChatGPT Desktop and other apps before certificate revocation in June.
A scan of a million self-hosted AI services found widespread misconfiguration, with many systems exposed without any authentication, leaving sensitive data and powerful models open to abuse.
Three newly published versions of the Node IPC npm package contain a stealthy backdoor that exfiltrates developer credentials across 90…
CISA mandates federal agencies patch a critical Cisco SD WAN authentication bypass by May 17 as threat actors exploit the…
Attackers can exploit a Server-Side Request Forgery flaw in self-hosted Next.js to bypass firewalls and steal IAM credentials and API…
The TencShell framework repurposes open source Rshell code and uses Tencent style API traffic to hide its command and control…
Microsoft warns that attackers are exploiting a critical cross site scripting flaw in Exchange Server's Outlook Web Access to perform…
The malware has evolved from a standard backdoor into a modular ecosystem targeting government and diplomatic organizations across Europe and…
Sign in to your account