Attackers exploit misconfigured email routing and weak spoof protections to send internal-looking phishing emails for ...
A critical flaw in legacy D-Link DSL routers lets unauthenticated attackers run commands and hijack DNS, with active ...
Security researchers found two Chrome extensions with 900,000 installs secretly collecting ChatGPT and DeepSeek chats and ...
CERT/CC warns an unpatched TOTOLINK EX200 firmware flaw lets authenticated attackers enable unauthenticated root telnet and ...
AI-based VS Code forks recommended unclaimed extensions, allowing malicious uploads in Open VSX and risking developer systems ...
A new PHALT#BLYX campaign targets European hotels using fake Booking.com emails, ClickFix lures, PowerShell, and MSBuild to ...
A critical CVSS 9.2 flaw in AdonisJS bodyparser lets attackers write arbitrary files via path traversal when uploads are ...
Critical n8n flaw CVE-2025-68668 allows authenticated users to run system commands via workflows; affects versions 1.0.0 to ...
Russia-aligned UAC-0184 abuses Viber messages to deliver Hijack Loader and Remcos RAT in espionage attacks on Ukrainian ...
Kimwolf is an Android botnet that infected 2M+ devices via exposed ADB, using proxy networks to run DDoS attacks and sell ...
First 2026 cyber recap covering IoT exploits, wallet breaches, malicious extensions, phishing, malware, and early AI abuse.
Cybersecurity shifts toward hardware trust, AI-driven defense, network visibility, and human risk as attackers move faster ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results