A new webinar from Wiz explains how attackers chain together small coding bugs and cloud misconfigurations to access sensitive data, and how teams can break that path.
The Dead.Letter vulnerability affects Exim mail server versions 4.97 through 4.99.2 compiled with GnuTLS, enabling heap corruption via a crafted…
Google uncovered a criminal campaign in which an AI system was used to discover a zero day vulnerability and generate…
The open-source release of a credential-stealing worm has triggered a wave of copycat attacks targeting developer environments and cloud infrastructure.
MicroStealer malware uses Discord webhooks to exfiltrate credentials and cryptocurrency wallet data from education and telecom targets with low detection…
An unauthenticated buffer overflow in the PAN-OS authentication portal allows remote attackers to execute arbitrary code with root privileges, with…
Flare researchers analyzed 128 underground posts revealing REMUS malware's rapid evolution from a simple stealer to a full commercial MaaS…
Cybercriminals are using phishing and email compromise techniques, traditionally associated with ransomware, to steal truckloads of freight worth hundreds of…
Microsoft's new Cloud Initiated Driver Recovery automatically rolls back faulty Windows drivers delivered through Windows Update, removing the need for…
Microsoft will patch Edge to stop decrypting saved credentials into process memory at startup, reversing its earlier position that the…
The attacker exploited a misconfigured GitHub Action called a Pwn Request vulnerability to steal privileged tokens and download the source code from multiple private repositories.
Researchers used Anthropic's Mythos Preview AI to develop the first public kernel exploit bypassing Apple's M5 Memory Integrity Enforcement in…
A race condition in the Linux kernel's ptrace logic allows local attackers to steal open file descriptors from privileged processes…
The Cybersecurity Stars Awards 2026 will recognize organizations and individuals making meaningful contributions to security innovation, execution, and real-world impact.
Cyera researchers discovered four OpenClaw vulnerabilities that form an attack chain allowing data theft, privilege escalation, and persistent backdoor access.
Three newly published versions of the node-ipc npm package contain obfuscated malware that steals cloud credentials and exfiltrates data through DNS queries.
Vercel's security update for Next.js and React Server Components addresses over a dozen vulnerabilities, including denial of service, middleware bypass, and server side request forgery flaws.
Attackers can leak heap memory or crash PHP servers by uploading specially crafted JPEG images to web applications that parse image metadata.
A compromised CMS flaw allowed attackers to replace JDownloader installers with a Python based RAT targeting Windows and Linux users.
The Tiny UDP Cannon vulnerability in Android 16 lets apps with basic permissions leak traffic past the VPN by exploiting…
A 45 day assessment of internal tools reveals that trusted utilities like PowerShell and WMIC are used in 84% of…
Attackers can exploit unsafe class loading in the Redshift JDBC driver by supplying a crafted database URL, leading to full…
TeamPCP's TanStack npm supply chain attack compromised two OpenAI employee workstations, prompting certificate rotation and urgent macOS app update requirements.
Attackers exploited a legitimate HPE monitoring tool for over 100 days, pushing malicious scripts through a trusted management channel without…
Sign in to your account