KadNap botnet infects 14,000+ routers using DHT-based P2P control while ClipXDaemon hijacks crypto wallets on Linux X11.
Attack surface exposure leaves services reachable as exploits appear within 24–48 hours after disclosure, increasing breach risk.
Nine “LeakyLooker” flaws in Google Looker Studio allowed cross-tenant SQL access across GCP services before being patched.
APT28 deploys BEARDSHELL and COVENANT since April 2024 targeting Ukrainian military, enabling cloud-based espionage and persistent surveillance.
Modified AuraInspector scans misconfigured Salesforce Experience Cloud sites, extracting CRM data and enabling targeted vishing campaigns.
Attackers exploit FortiGate vulnerabilities to steal LDAP credentials and breach networks, enabling AD access and malware deployment.
UNC4899 breached a crypto firm via AirDrop malware and cloud exploitation in 2025, stealing millions through Kubernetes and Cloud SQL abuse.
Malicious Chrome extensions tied to ownership transfers push malware and steal data, exposing thousands to credential theft ...
Bitdefender GravityZone webinar shows how mid-market teams consolidate security tools to reduce complexity and improve ...
Your weekly cybersecurity roundup covering the latest threats, exploits, vulnerabilities, and security news you need to know.
New hacking cluster exploits web servers and Mimikatz to infiltrate Asian infrastructure for long-term espionage in aviation, ...
CVSS severity scores often mislead vulnerability prioritization when business context is ignored, leaving critical exposures ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results