The flaws enable an unauthenticated attacker to crash Exim servers remotely by sending specially crafted DNS responses, leading to denial of service.
The EtherRAT campaign leverages poisoned search results and counterfeit GitHub repositories to trick enterprise administrators into installing a remote access…
The CVE MCP Server provides 27 tools across 21 APIs, allowing Claude to directly query vulnerability databases and correlate findings…
The publicly available cPanelSniper exploit has already been used to breach over 44,000 servers, making immediate patching critical for all…
The actively exploited cPanel vulnerability gives attackers root level access to government web servers, allowing for data theft and network…
PoC code for the cPanel authentication bypass is now circulating, enabling attackers to take full control of vulnerable web hosting…
Claude Security provides enterprise teams with automated testing for prompt injection and data leakage risks during AI deployment.
The AiTM phishing method captures both passwords and session cookies in real time, allowing attackers to bypass multi factor authentication…
The campaign uses Google AppSheet and Netlify to host convincing fake login pages while Telegram silently forwards captured credentials to…
The ClickFix technique tricks users into running a malicious PowerShell command disguised as a browser error repair, enabling attackers to…
The attack relies on social engineering to trick users into copying and running a malicious PowerShell payload disguised as a browser verification step.
Microsoft has confirmed active exploitation of a Windows Shell privilege escalation bug, urging all organizations to apply the April 2026…
The attack leverages both malicious Docker images on Docker Hub and fake VS Code extensions, requiring developers to verify all…
Security researchers documented proof-of-concept exploits being deployed against unpatched LMDeploy servers within hours of the vulnerability announcement.
GoGra uses OAuth tokens to blend into normal Office 365 traffic, making detection difficult for signature based security tools.
FIRESTARTER backdoor embeds itself in the firmware of Cisco Firepower appliances, allowing it to survive OS reinstalls and standard security patches.
The EtherRAT trojan is being distributed through fraudulent GitHub repositories that convincingly mimic legitimate system administration tools to trick IT professionals into downloading the malware.
Exploitation attempts have already been detected in the wild, prompting an urgent call for server administrators to apply security patches immediately.
The Silk Typhoon hacker allegedly targeted over a dozen universities and vaccine developers in a multi year espionage campaign.
The attacker exfiltrated source code and proprietary information from multiple GitHub repositories, prompting an ongoing investigation with law enforcement.
The attack leverages a trojanized npm package to steal credentials from developer environments connected to Bitwarden CLI workflows.
The iOS flaw allowed forensic extraction of supposedly deleted conversations from Signal and other encrypted apps, undermining user privacy controls.
The DDoS attack temporarily blocked access to Ubuntu's website and other Canonical web properties, disrupting updates and support for users…
The intruder accessed a Trellix source code repository, potentially exposing proprietary code used in the company's cybersecurity products.

Sign in to your account