Trend Micro has confirmed at least one in the wild exploit attempt against a directory traversal vulnerability in its Apex One enterprise security platform, prompting CISA to order federal agencies to patch within three weeks.
Google's accidental publication of an unfixed Chromium flaw allows JavaScript to run silently in browsers even after they are closed,…
A new methodology shows how to test Windows kernel driver vulnerabilities for exploitability without requiring the specific hardware the driver…
A VPN service advertised on Russian cybercrime forums as a way to hide from police has been taken offline in…
Anthropic's Claude Mythos Preview AI identified over 10,000 high-severity flaws in critical software, with 97 findings already patched upstream.
A new heap overflow vulnerability in NGINX allows unauthenticated remote attackers to crash worker processes or execute arbitrary code.
Modern crypto drainer operations have evolved into structured affiliate programs that steal assets by tricking users into approving malicious blockchain…
Italian police seized servers and fined subscribers in a major crackdown on a pirate streaming app that hijacked legitimate platform…
Flipper Devices is asking developers and engineers to help build its new portable ARM Linux computer, which is designed for…
GitHub now requires human approval with 2FA for npm package publications and gives developers granular control over package install sources.
A North Korean linked threat actor uses Hugging Face's trusted platform to host malware and exfiltrate stolen data from developer machines infected through malicious npm packages.
The compromised art-template npm package silently injected a Coruna exploit kit into web applications, targeting iOS users with a watering…
Fraud prevention teams that focus solely on chargeback rates miss hidden costs from account takeovers, false positives, and operational drag…
The campaign leverages Showboat Linux malware and JMFBackdoor Windows implant for long term espionage against telecom networks.
Apple blocked over $2.2 billion in fraudulent App Store transactions in 2025, part of a six year total exceeding $11 billion.
A Belarus aligned threat group is targeting Ukrainian government entities with phishing emails that trick victims into downloading malware disguised as a link to a learning platform.
The JOMANGY webshell uses six interconnected persistence layers that can each reconstruct the others, making infections resistant to cleanup even after patching.
A 23 year old Canadian man has been arrested for operating the Kimwolf botnet, which infected unsecured devices like digital photo frames to launch massive DDoS attacks on global targets.
CISA adds two actively exploited flaws to its KEV catalog, including a critical Langflow vulnerability exploited by Iranian state hackers…
A legitimate signed Lenovo driver contains a security flaw that lets low privileged users terminate any process, including EDR and…
The FBI warns that the Kali365 phishing platform captures OAuth tokens through Microsoft's legitimate device code flow, allowing attackers to…
Microsoft is rolling out a change to Edge that prevents saved passwords from remaining in plaintext memory throughout the browsing…
Microsoft dismantled Fox Tempest, a malware signing service that used fraudulently obtained certificates to help cybercriminals bypass security controls.
Threat actors are actively exploiting a critical cPanel authentication bypass flaw to drop a cross-platform backdoor and steal credentials from…
Sign in to your account