A China-linked threat group exploited the same unpatched Microsoft Exchange server across three attack waves over two months, deploying different backdoors each time against an Azerbaijani energy company.
Fragnesia is a recently disclosed Linux kernel flaw that lets local attackers gain root privileges by exploiting memory fragmentation handling.
Android's new intrusion logging feature stores tamper resistant forensic evidence of spyware activity, aiding investigators in detecting infections from tools…
Apple's iOS 26.5 introduces end to end encrypted RCS messaging between iPhone and Android devices, closing a major privacy gap…
The buffer overflow in Exim's BDAT handling with GnuTLS allows unauthenticated remote attackers to execute arbitrary code on affected mail…
The combined patch bundle for Windows 11 versions 24H2 and 25H2 fixes a remote code execution flaw in the Print…
Twenty nine critical remote code execution vulnerabilities pose immediate risk to unpatched Windows systems and network infrastructure.
A new TrickMo variant uses TON blockchain for command and control and a SOCKS5 proxy to turn infected Android devices…
A newly discovered downgrade attack bypasses Windows 11 BitLocker encryption in roughly five minutes, requiring physical device access but putting…
Google TAG reports adversaries are using large language models to autonomously generate functional zero day exploits, compressing the weaponization timeline…
cPanel and WHM have released emergency patches for three vulnerabilities that could allow attackers to compromise web hosting environments through authentication bypass and privilege escalation.
North Korea's ScarCruft group uses a gaming platform to deploy BirdCall malware, while critical RCE flaws in Apache HTTP/2, MetInfo…
The VENOMOUS#HELPER campaign uses phishing emails disguised as Social Security Administration statements to trick victims into installing legitimate remote access…
Researchers from Airbus SecLab discovered the authentication bypass and privilege escalation flaws in Progress MOVEit Automation, prompting urgent patches across…
The attacker exploited a malfunctioning endpoint sensor to maintain undetected access for ten days, stealing certificates used to sign Zhong Stealer malware.
AI tools like ChatGPT and Claude Code enabled individuals with no coding background to conduct attacks previously requiring skilled engineers, as exploit windows shrank to 44 days and malicious software…
More than 1,600 phishing emails were flagged between early January and early February 2026 across industrial, consulting, retail, and transportation sectors.
Varonis researchers found that Bluekit's centralized dashboard captures session tokens and cookies after victims complete 2FA, rendering that security measure ineffective.
Security researchers uncovered a supply chain attack where a fake TanStack npm package used automated postinstall scripts to harvest environment…
The threat actor also used a prior custom exploit chain involving SQL injection and CAPTCHA bypass against an Indonesian defense…
The Mini Shai-Hulud worm uses a Bun runtime bootstrap to silently harvest credentials from developer machines, cloud platforms, and AI…
The flaw was introduced through three separate kernel changes made in 2011, 2015, and 2017, none of which appeared malicious…
The international operation involved 276 arrests and the shutdown of nine scam centers, with human trafficking victims forced to run…
A botched merge left critical Apache MINA deserialization fixes unpublished until project maintainers caught the error and reissued versions 2.2.7…

Sign in to your account