Google warns AI can now autonomously craft zero-day exploits as North Korean hackers weaponize Git hooks and ODINI malware exfiltrates data from air-gapped computers via CPU magnetic emissions.
Attackers are exploiting a critical cPanel vulnerability to deploy persistent backdoors, while Apache HTTP/2, PAN-OS, and Linux kernel zero-days are…
A wave of coordinated cyberattacks combines AI-generated exploits, phantom device registration, magnetic emission data theft, and social engineering across Windows,…
Active exploits targeting Palo Alto PAN-OS, Ivanti EPMM, Apache HTTP/2, and the Linux kernel demand urgent patching across enterprise and…
cPanel and WHM have released emergency patches for three vulnerabilities that could allow attackers to compromise web hosting environments through…
A wave of critical vulnerabilities, new malware families, and AI-driven attacks target Apache, Chrome, Firefox, Linux, Azure AD, Microsoft Teams,…
A wave of critical vulnerabilities and active attack campaigns demands immediate patching across Android, Apache, Chrome, Linux, and enterprise platforms.
Attackers are exploiting PAN-OS and Ivanti EPMM zero-days while a new Mirai botnet variant and PyPI malware campaigns escalate threats…
A roundup of the week's top cybersecurity news includes supply chain attacks on Google Android and DAEMON Tools, active exploitation…
North Korea's ScarCruft group uses a gaming platform to deploy BirdCall malware, while critical RCE flaws in Apache HTTP/2, MetInfo…
Apache HTTP Server, Microsoft Edge, and a new MicroStealer malware each pose distinct threats, from remote code execution to credential theft and targeted sector attacks.
More than 1,600 phishing emails were flagged between early January and early February 2026 across industrial, consulting, retail, and transportation…
Researchers from Airbus SecLab discovered the authentication bypass and privilege escalation flaws in Progress MOVEit Automation, prompting urgent patches across…
The VENOMOUS#HELPER campaign uses phishing emails disguised as Social Security Administration statements to trick victims into installing legitimate remote access…
The threat actor also used a prior custom exploit chain involving SQL injection and CAPTCHA bypass against an Indonesian defense training portal before pivoting to cPanel attacks.
AI tools like ChatGPT and Claude Code enabled individuals with no coding background to conduct attacks previously requiring skilled engineers, as exploit windows shrank to 44 days and malicious software…
Security researchers uncovered a supply chain attack where a fake TanStack npm package used automated postinstall scripts to harvest environment files containing API keys, tokens, and credentials.
The flaw was introduced through three separate kernel changes made in 2011, 2015, and 2017, none of which appeared malicious individually.
The attacker exploited a malfunctioning endpoint sensor to maintain undetected access for ten days, stealing certificates used to sign Zhong…
Varonis researchers found that Bluekit's centralized dashboard captures session tokens and cookies after victims complete 2FA, rendering that security measure…
The Mini Shai-Hulud worm uses a Bun runtime bootstrap to silently harvest credentials from developer machines, cloud platforms, and AI…
A botched merge left critical Apache MINA deserialization fixes unpublished until project maintainers caught the error and reissued versions 2.2.7…
The international operation involved 276 arrests and the shutdown of nine scam centers, with human trafficking victims forced to run…
Attackers now use AI models to discover and exploit zero day vulnerabilities in minutes, with documented campaigns like GAMECHANGE showing…

Sign in to your account