A new malware campaign has been identified using a Python-based delivery system to deploy CastleLoader malware ...
Pro-Russia hacktivist groups have been observed exploiting exposed virtual network computing connections to breach OT systems ...
The flaw, dubbed ‘GeminiJack,’ exploits the trust boundary between user-controlled content in data sources and the AI model’s ...
Sonatype has claimed that 13% of Log4j versions downloaded this year were vulnerable to the legacy critical Log4Shell bug ...
CVE-2025-62221 is an elevation of privilege (EoP) bug in the Windows Cloud Files Mini Filter Driver, which enables a low-privileged user to achieve system-level code execution through a kernel-mode ...
Sysdig has found sophisticated malicious campaigns exploiting React2Shell that delivered EtherRAT and suggested North Korean ...
Two malicious Visual Studio Code extensions, Bitcoin Black and Codo AI, have been observed harvesting sensitive user data ...
A custom loader initiated the vulnerable driver, located targeted endpoint detection services then issued kernel-level commands to kill them. After this, a PowerShell script escalated privileges, shut ...
The UK’s National Cyber Security Centre has warned of the dangers of comparing prompt injection to SQL injection ...
Gartner has recommended that enterprises block use of AI browsers until the associated risks can be adequately managed. The ...
Energy companies face rising credential-based cyber threats as IT and OT systems converge. The article explains how legacy ...
A new iteration of the ClayRat Android spyware featuring expanded surveillance and device-control functions has been ...