A new malware campaign has been identified using a Python-based delivery system to deploy CastleLoader malware ...
The flaw, dubbed ‘GeminiJack,’ exploits the trust boundary between user-controlled content in data sources and the AI model’s ...
Sonatype has claimed that 13% of Log4j versions downloaded this year were vulnerable to the legacy critical Log4Shell bug ...
Pro-Russia hacktivist groups have been observed exploiting exposed virtual network computing connections to breach OT systems ...
CVE-2025-62221 is an elevation of privilege (EoP) bug in the Windows Cloud Files Mini Filter Driver, which enables a low-privileged user to achieve system-level code execution through a kernel-mode ...
The UK’s National Cyber Security Centre has warned of the dangers of comparing prompt injection to SQL injection ...
Sysdig has found sophisticated malicious campaigns exploiting React2Shell that delivered EtherRAT and suggested North Korean ...
Gartner has recommended that enterprises block use of AI browsers until the associated risks can be adequately managed. The ...
Two malicious Visual Studio Code extensions, Bitcoin Black and Codo AI, have been observed harvesting sensitive user data ...
A data breach at Marquis Software Solutions due to a firewall flaw has affected over 780,000 people across the US ...
React2Shell (CVE-2025-55182) is under active exploitation by Earth Lamia and Jackpot Panda, risking over two million ...
A new iteration of the ClayRat Android spyware featuring expanded surveillance and device-control functions has been ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results