News

The starting point of the attack is a compressed archive that's delivered to victims via malvertising or search engine ...
"An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in ...
Zoom and Xerox patched critical flaws enabling privilege escalation and RCE, risking corporate network compromise.
Microsoft fixed 111 vulnerabilities, including a Windows Kerberos zero-day enabling full AD compromise via BadSuccessor.
Charon ransomware targets Middle East sectors using APT-style evasion, causing faster, harder-to-recover encryption.
An AI SOC brings together a range of capabilities that strengthen and scale the core functions of a security operations ...
ShinyHunters and Scattered Spider are teaming up in a coordinated Salesforce phishing and extortion campaign, with ...
Coordinated brute-force attacks hit Fortinet SSL VPNs and FortiManager, involving 780+ malicious IPs from U.S., Canada, ...
Researchers found 35 Docker Hub images, including Debian builds, still carrying the XZ Utils backdoor a year later, ...
Dutch NCSC warns of CVE-2025-6543 Citrix attacks on critical organizations, urging urgent patches to prevent further breaches ...
The Ultimate Battle: Enterprise Browsers vs. Enterprise Browser Extensions examines this choice across nine "rounds": ...
Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform ...