The attacker processed data from 305 servers and generated 2,597 intelligence reports using a custom Python script linked to OpenAI's API.
The 2026 SANS survey found that over a quarter of identity attacks involved MFA fatigue, highlighting the growing sophistication of…
cPanel issued urgent patches for an authentication bypass flaw; GitHub fixed CVE-2026-3854 RCE exploitable via a single push; and Trellix…
The actively exploited cPanel authentication bypass zero day has already been used to compromise high value government and military servers,…
The EtherRAT campaign exploits search engine rankings and trust in GitHub to deliver a remote access trojan to system administrators…
The tool aggregates vulnerability data from 21 different APIs including NVD, Exploit DB, and vendor advisories, allowing Claude to perform…
The public release of the cPanelSniper exploit, which leverages CVE-2023-29489, has triggered a mass compromise of roughly 44,000 web hosting…
Anthropic is inviting enterprise beta testers to evaluate Claude Security features including audit logs and customizable data governance policies.
The AiTM tactic uses a real time proxy to steal authentication tokens after the user completes MFA, bypassing one of…
The scheme uses Google AppSheet to host fake login forms, Netlify for a secondary phishing page, and Telegram to exfiltrate…
Attackers use a malicious combination of fake CAPTCHA challenges and deceptive 'ClickFix' prompts to trick users into launching credential stealing malware via PowerShell.
The flaws enable an unauthenticated attacker to crash Exim servers remotely by sending specially crafted DNS responses, leading to denial…
Microsoft has confirmed active exploitation of a Windows Shell privilege escalation bug, urging all organizations to apply the April 2026…
The attack leverages both malicious Docker images on Docker Hub and fake VS Code extensions, requiring developers to verify all…
Security researchers documented proof-of-concept exploits being deployed against unpatched LMDeploy servers within hours of the vulnerability announcement.
GoGra uses OAuth tokens to blend into normal Office 365 traffic, making detection difficult for signature based security tools.
FIRESTARTER backdoor embeds itself in the firmware of Cisco Firepower appliances, allowing it to survive OS reinstalls and standard security patches.
The Silk Typhoon hacker allegedly targeted over a dozen universities and vaccine developers in a multi year espionage campaign.
The attacker exfiltrated source code and proprietary information from multiple GitHub repositories, prompting an ongoing investigation with law enforcement.
The attack leverages a trojanized npm package to steal credentials from developer environments connected to Bitwarden CLI workflows.
The iOS flaw allowed forensic extraction of supposedly deleted conversations from Signal and other encrypted apps, undermining user privacy controls.
The DDoS attack temporarily blocked access to Ubuntu's website and other Canonical web properties, disrupting updates and support for users…
The intruder accessed a Trellix source code repository, potentially exposing proprietary code used in the company's cybersecurity products.
The adoption of generative AI by ransomware groups has enabled automated vulnerability scanning and custom ransom note generation, pushing global…

Sign in to your account