North Korean hackers are deploying advanced social engineering tactics combined with never-before-seen macOS malware strains to siphon cryptocurrency assets. The [...]
Hackers are actively exploiting critical vulnerabilities in SolarWinds Web Help Desk (WHD) to install legitimate administrative software for harmful purposes. [...]
Hackers are actively exploiting a severe flaw, designated CVE-2025-11953, in the React Native Metro development server. This vulnerability allows them [...]
Google's Threat Intelligence Group, in collaboration with industry partners, has disrupted the infrastructure of IPIDEA, one of the world's largest [...]
Two critical vulnerabilities in the popular open-source automation platform n8n allow authenticated attackers to escape its security sandbox and execute [...]
A new malware-as-a-service (MaaS) operation, dubbed "Stanley," is advertising the creation and publication of malicious Chrome extensions designed to bypass [...]
The ShinyHunters cybercrime group has claimed responsibility for a series of sophisticated voice phishing (vishing) attacks targeting single sign-on accounts [...]
A critical vulnerability in the Advanced Custom Fields: Extended (ACF Extended) WordPress plugin allows unauthenticated attackers to gain administrative control [...]
A critical vulnerability in Fortinet's Security Information and Event Management (SIEM) platform, tracked as CVE-2025-25256, allows unauthenticated remote attackers to [...]
A threat group calling itself "Scattered Lapsus$ Hunters" claims to have successfully breached the cybersecurity firm Resecurity, stealing alleged internal [...]
Security researchers have identified two distinct campaigns distributing sophisticated malware loaders through deceptive distribution channels. The first leverages cracked software [...]
A new campaign named "GhostPairing" is exploiting WhatsApp's legitimate device-linking feature to hijack user accounts without requiring authentication. Attackers initiate [...]
A newly discovered zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan) service allows attackers to crash the critical [...]
Multiple prominent ransomware gangs are utilizing a packer-as-a-service platform called Shanya to conceal and deploy malware designed to disable endpoint [...]