Fortinet released updates for an actively exploited FortiOS SSO authentication bypass flaw, CVE-2026-24858, now listed by ...
Pakistan-linked hackers targeted Indian government entities using phishing, Google services, Golang malware, and GitHub-based ...
CTEM is a continuous approach that helps cybersecurity teams identify, prioritize, & validate exploitable risks using threat ...
Meta is rolling out Strict Account Settings on WhatsApp and using Rust-based media code to protect journalists and high-risk ...
A critical Grist-Core flaw (CVE-2026-24002, CVSS 9.1) allows remote code execution through malicious formulas when Pyodide ...
ClickFix uses fake CAPTCHAs and a signed Microsoft App-V script to deploy Amatera stealer on enterprise Windows systems.
Experts details PeckBirdy, a JavaScript C2 framework used since 2023 by China-aligned attackers to spread malware via fake ...
Microsoft released out-of-band patches for an actively exploited Microsoft Office zero-day, CVE-2026-21509, a security ...
Indian users face a cyber espionage campaign using tax phishing, Blackmoon malware, and abused SyncFuture TSM tools for ...
Weekly cybersecurity recap covering emerging threats, fast-moving attacks, critical flaws, and key security developments you ...
Security researchers found two AI-branded VS Code extensions with 1.5M installs that covertly send source code and files to ...
North Korean group Konni uses AI-assisted PowerShell malware and phishing via Google ads and Discord to breach blockchain ...