OpenAI disclosed a supply chain breach affecting two employee devices via the TanStack attack, requiring macOS users to update ChatGPT Desktop and other apps before certificate revocation in June.
A scan of a million self-hosted AI services found widespread misconfiguration, with many systems exposed without any authentication, leaving sensitive…
Three newly published versions of the Node IPC npm package contain a stealthy backdoor that exfiltrates developer credentials across 90…
Microsoft warns customers that attackers are actively exploiting a high-severity cross-site scripting flaw in on-premises Exchange Server via malicious email…
CISA mandates federal agencies patch a critical Cisco SD WAN authentication bypass by May 17 as threat actors exploit the…
Attackers can exploit a Server-Side Request Forgery flaw in self-hosted Next.js to bypass firewalls and steal IAM credentials and API…
The TencShell framework repurposes open source Rshell code and uses Tencent style API traffic to hide its command and control…
Microsoft warns that attackers are exploiting a critical cross site scripting flaw in Exchange Server's Outlook Web Access to perform…
The malware has evolved from a standard backdoor into a modular ecosystem targeting government and diplomatic organizations across Europe and…
The FrostyNeighbor hacking group targets Ukrainian government organizations with spearphishing emails and server side filtering before abusing Windows Scheduled Tasks…
The flaw gives unauthenticated attackers full administrative control over enterprise SD-WAN infrastructure without any valid credentials.
Researchers detail a months-long espionage operation where an APT group exploited an Exchange server flaw to breach an Azerbaijani energy…
Google's Chrome 148 update patches 79 security flaws, including 14 critical bugs that could allow remote code execution through malicious…
Chaotic Eclipse reveals two zero day flaws, one bypassing BitLocker encryption via the Windows Recovery Environment and another elevating privileges…
Attackers began probing PraisonAI deployments within hours of the advisory, scanning for the exposed /agents and /chat endpoints on internet connected instances.
Palo Alto Networks warns of active exploitation of a PAN-OS remote code execution vulnerability by state-sponsored actors, with patches expected in mid May.
Microsoft uncovered a credential theft campaign that used fake code of conduct violations to trick 35,000 users across 13,000 organizations in a three day window.
The Dirty Frag vulnerability exploits two separate kernel page cache write flaws to provide reliable root access without requiring race conditions or causing system crashes.
Cisco warns of active attacks exploiting a maximum severity authentication bypass in Catalyst SD WAN Controller that grants attackers full…
Microsoft researchers use large language models to generate realistic command lines and process trees for simulating human operated intrusions in…
A supply chain attack compromised 170 npm packages using worm like malware that steals GitHub, AWS, and Kubernetes credentials from…
New benchmark data reveals that most major AI models are more likely to produce confidently wrong answers than correct ones,…
Ghostwriter uses region restricted PDF files to deliver Cobalt Strike payloads exclusively to Ukrainian government targets, evading global security researchers.
A double free error in Apache's HTTP/2 stream handling allows attackers to crash servers with a single connection, with potential…
Sign in to your account