News
PipeMagic is a plugin-based modular malware that uses a domain hosted on the Microsoft Azure cloud provider to stage the ...
PyPI malware termncolor and colorinal downloaded 884 times exploit DLL side-loading, persistence, and C2 communication.
The tools designed to accelerate innovation are degrading application security by embedding subtle yet serious vulnerabilities in software. Nearly half of the code snippets generated by five AI models ...
U.S. sanctions Garantex, successor Grinex, after $100M illicit crypto flow fuels ransomware and sanctions evasion.
EncryptHub exploits CVE-2025-26633 with social engineering and rogue MSC files, delivering Fickle Stealer malware.
ERMAC was first documented by ThreatFabric in September 2021, detailing its ability to conduct overlay attacks against ...
UAT-7237 exploits unpatched Taiwan servers using SoundBill, Cobalt Strike, and SoftEther VPN for persistent control.
The vulnerability, assigned the CVE identifier CVE-2025-20265 (CVSS score: 10.0), affects the RADIUS subsystem implementation ...
The policy applies to markets like Bahrain, Canada, Hong Kong, Indonesia, Israel, Japan, the Philippines, South Africa, South ...
MadeYouReset exploit bypasses HTTP/2 Rapid Reset mitigations, affecting major servers and enabling large-scale DoS attacks.
"An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in ...
Blocking unknown apps and enforcing MFA reduce ransomware risk and credential theft across enterprise networks.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results