Apache HTTP Server, Microsoft Edge, and a new MicroStealer malware each pose distinct threats, from remote code execution to credential theft and targeted sector attacks.
More than 1,600 phishing emails were flagged between early January and early February 2026 across industrial, consulting, retail, and transportation…
Researchers from Airbus SecLab discovered the authentication bypass and privilege escalation flaws in Progress MOVEit Automation, prompting urgent patches across…
The VENOMOUS#HELPER campaign uses phishing emails disguised as Social Security Administration statements to trick victims into installing legitimate remote access…
The threat actor also used a prior custom exploit chain involving SQL injection and CAPTCHA bypass against an Indonesian defense…
AI tools like ChatGPT and Claude Code enabled individuals with no coding background to conduct attacks previously requiring skilled engineers,…
Security researchers uncovered a supply chain attack where a fake TanStack npm package used automated postinstall scripts to harvest environment…
The flaw was introduced through three separate kernel changes made in 2011, 2015, and 2017, none of which appeared malicious…
The attacker exploited a malfunctioning endpoint sensor to maintain undetected access for ten days, stealing certificates used to sign Zhong…
Varonis researchers found that Bluekit's centralized dashboard captures session tokens and cookies after victims complete 2FA, rendering that security measure…
The Mini Shai-Hulud worm uses a Bun runtime bootstrap to silently harvest credentials from developer machines, cloud platforms, and AI coding tools before npm install completes.
A botched merge left critical Apache MINA deserialization fixes unpublished until project maintainers caught the error and reissued versions 2.2.7…
The international operation involved 276 arrests and the shutdown of nine scam centers, with human trafficking victims forced to run…
Attackers now use AI models to discover and exploit zero day vulnerabilities in minutes, with documented campaigns like GAMECHANGE showing…
Two critical MOVEit Automation vulnerabilities discovered by Airbus SecLab researchers allow unauthenticated attackers to bypass authentication and escalate privileges to full administrative control.
The flaw allows attackers on the same local network to inject commands into the dhclient configuration file through unescaped double quotes in BOOTP responses.
Security researchers warn that email bombing, which triggers panic, is the entry point for fake IT support calls that achieve a 72 percent success rate.
CISA warns that CVE-2026-41940, an authentication bypass in cPanel and WHM, is being actively exploited, giving attackers full administrative control over web hosting environments.
The attacker processed data from 305 servers and generated 2,597 intelligence reports using a custom Python script linked to OpenAI's…
The 2026 SANS survey found that over a quarter of identity attacks involved MFA fatigue, highlighting the growing sophistication of…
cPanel issued urgent patches for an authentication bypass flaw; GitHub fixed CVE-2026-3854 RCE exploitable via a single push; and Trellix…
The actively exploited cPanel authentication bypass zero day has already been used to compromise high value government and military servers,…
The EtherRAT campaign exploits search engine rankings and trust in GitHub to deliver a remote access trojan to system administrators…
The tool aggregates vulnerability data from 21 different APIs including NVD, Exploit DB, and vendor advisories, allowing Claude to perform…

Sign in to your account