A new malware campaign has been identified using a Python-based delivery system to deploy CastleLoader malware ...
Sonatype has claimed that 13% of Log4j versions downloaded this year were vulnerable to the legacy critical Log4Shell bug ...
The flaw, dubbed ‘GeminiJack,’ exploits the trust boundary between user-controlled content in data sources and the AI model’s ...
Pro-Russia hacktivist groups have been observed exploiting exposed virtual network computing connections to breach OT systems ...
CVE-2025-62221 is an elevation of privilege (EoP) bug in the Windows Cloud Files Mini Filter Driver, which enables a low-privileged user to achieve system-level code execution through a kernel-mode ...
The UK’s National Cyber Security Centre has warned of the dangers of comparing prompt injection to SQL injection ...
Sysdig has found sophisticated malicious campaigns exploiting React2Shell that delivered EtherRAT and suggested North Korean ...
Gartner has recommended that enterprises block use of AI browsers until the associated risks can be adequately managed. The ...
Two malicious Visual Studio Code extensions, Bitcoin Black and Codo AI, have been observed harvesting sensitive user data ...
A data breach at Marquis Software Solutions due to a firewall flaw has affected over 780,000 people across the US ...
Energy companies face rising credential-based cyber threats as IT and OT systems converge. The article explains how legacy ...
A new iteration of the ClayRat Android spyware featuring expanded surveillance and device-control functions has been ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results