- CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
- SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
- ⚡ Weekly Recap: Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More
- Manufacturing Security: Why Default Passwords Must Go
- TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors
- Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
- Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
- NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
- Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
- Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
- Google Ordered to Pay $314M for Misusing Android Users' Cellular Data Without Permission
- Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
- Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
- The Hidden Weaknesses in AI SOC Tools that No One Talks About
- Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms