Two malicious Chrome extensions with over 900,000 downloads were exfiltrating browser data and conversations with ChatGPT and ...
A vulnerability in Totolink EX200 leads to the launch of an unauthenticated root-level Telnet service, allowing complete ...
CISA’s Known Exploited Vulnerabilities (KEV) catalog includes four weaknesses found in the product in recent years, including ...
Cybersecurity companies raised a total of nearly $14 billion in 2025, according to cybersecurity recruitment firm Pinpoint ...
Threat actors are exploiting CVE-2026-0625, a critical zero-day vulnerability in discontinued D-Link devices for remote code ...
Threat actors abuse complex routing and misconfigured protections to spoof domains and send phishing emails that appear to be ...
Why panic-driven and hype-fueled advice fails in practice and why experienced security leaders prioritize pragmatic, accountable decision-making over noise.
Katie Paxton-Fear is neurodiverse (‘autistic’, she says). It’s a common, but not causal, condition among hackers. Autism ...
January 2026 Android update patches a single vulnerability, a critical Dolby issue whose existence came to light in October ...
Resecurity harvested data on Scattered Lapsus$ Hunters’s attack servers after the attackers “hacked” a honeypot and stole ...
A threat actor known as Zestix and Sentap has hacked dozens of global enterprises using credentials exfiltrated via information stealers.
Thirty cybersecurity-related merger and acquisition (M&A) deals were announced in December 2025, including 8 that exceeded $1 ...