Malicious actors replaced Windows and Linux JDownloader installers with a Python based remote access Trojan after exploiting an unpatched CMS vulnerability on the official website.
Microsoft released a mitigation for a BitLocker bypass that allows attackers with physical access to spawn an unrestricted shell and…
Two Microsoft Defender flaws are being exploited in the wild, allowing attackers to gain SYSTEM privileges or crash the antimalware…
GitHub confirmed a breach after a malicious Visual Studio Code extension compromised an employee device, leading to exfiltration of internal…
GhostTree exploits NTFS junctions to create recursive directory loops that trap EDR scanners in infinite traversal paths, leaving malicious files…
A SOCKS5 null-byte injection in Claude Code's network sandbox allowed attackers to exfiltrate credentials and source code for over five…
The critical bug in Cisco Secure Workload requires no authentication and grants attackers full Site Admin control via internal REST…
A three month breach at NYC Health Hospitals via a compromised third party vendor exposed biometric data, medical records, and…
The Driver Quality Initiative introduces four pillars to improve testing, partner accountability, and update hygiene for Windows 11 drivers.
Attackers now embed AI generated lookalike domains inside legitimate third party scripts, bypassing traditional security tools that have no visibility…
Researchers uncover DevilNFC, an Android malware that locks devices in Kiosk Mode and uses NFC relay to steal banking data from victims in Europe and Latin America.
Modern attack techniques easily bypass MFA by stealing session tokens, making continuous device posture checks essential for a zero trust…
ReliaQuest found attackers bypassing MFA on SonicWall Gen6 VPNs even after patching, requiring manual LDAP reconfiguration to fully close the…
Researchers discovered two new custom backdoors deployed by the Webworm threat actor that use Discord and Microsoft Graph API for…
The new open-source tools from Microsoft target AI agent vulnerabilities early in the software development lifecycle.
New research shows that over half of enterprise identity elements remain unmanaged, creating a critical vulnerability as organizations rapidly deploy autonomous AI agents that can exploit hidden credentials.
A typosquatted Go package remained dormant for years before activating a DNS based backdoor that persists even after its GitHub repository was deleted.
Attackers can execute commands on macOS by hiding malicious code in image metadata through a two-step copying technique that bypasses built-in filters.
A publicly released exploit targets a heap buffer overflow in PostgreSQL's pgcrypto extension that can give attackers full operating system…
A compromised Nx Console extension silently harvested developer credentials from password managers, cloud services, and code repositories through a multi…
A live webinar on June 2, 2026 will demonstrate how AI driven automation can eliminate manual bottlenecks in network incident…
HiddenLayer researchers found that the authentication check in ChromaDB's Python API runs too late, allowing attackers to load and execute…
The SHub malware family's latest variant bypasses Apple security by impersonating Google Software Update and using AppleScript to evade standard…
Four separate spear phishing campaigns used fake resumes and Solana meme coin content to deploy malware through trusted platforms like…
Sign in to your account