Amazon reports a new AWS crypto mining campaign abusing IAM credentials, ECS, EC2, and termination protection for persistence ...
React2Shell vulnerability CVE-2025-55182 is actively exploited to deploy Linux malware, run commands, and steal cloud ...
Attackers are exploiting two CVSS 9.8 FortiGate SSO authentication bypass flaws days after disclosure; Fortinet urges ...
Amazon reports a GRU-linked APT44 campaign from 2021–2025 targeting energy and critical infrastructure using misconfigured ...
Proactive Sensitive Data Leak Detection. Embed privacy across all stages in development, from IDE environments, with ...
A fake NuGet package mimicking Tracer.Fody stayed online for years, stealing Stratis wallet files and passwords from Windows ...
Google will shut down its Dark Web Report in February 2026, ending breach scans and deleting user data to refocus on ...
VolkLocker uses AES-256 in Galois/Counter Mode ( GCM) for encryption through Golang's "crypto/rand" package. Every encrypted ...
FreePBX patched 2025 flaws allowing SQL injection, file upload attacks, and an auth bypass only when webserver AUTHTYPE was ...
Researchers report phishing emails in Russia using ISO attachments to deploy Phantom Stealer against finance and related ...
A Google Chrome extension with a "Featured" badge and six million users has been observed silently gathering every prompt ...
Researchers detail new AI and phishing kits that steal credentials, bypass MFA, and scale attacks across major services.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results