Google confirms nation-state and cybercrime groups exploit a patched WinRAR flaw to gain persistence and deploy malware via ...
Fortinet released updates for an actively exploited FortiOS SSO authentication bypass flaw, CVE-2026-24858, now listed by ...
Pakistan-linked hackers targeted Indian government entities using phishing, Google services, Golang malware, and GitHub-based ...
CTEM is a continuous approach that helps cybersecurity teams identify, prioritize, & validate exploitable risks using threat ...
A critical Grist-Core flaw (CVE-2026-24002, CVSS 9.1) allows remote code execution through malicious formulas when Pyodide ...
Meta is rolling out Strict Account Settings on WhatsApp and using Rust-based media code to protect journalists and high-risk ...
ClickFix uses fake CAPTCHAs and a signed Microsoft App-V script to deploy Amatera stealer on enterprise Windows systems.
Microsoft released out-of-band patches for an actively exploited Microsoft Office zero-day, CVE-2026-21509, a security ...
Experts details PeckBirdy, a JavaScript C2 framework used since 2023 by China-aligned attackers to spread malware via fake ...
Indian users face a cyber espionage campaign using tax phishing, Blackmoon malware, and abused SyncFuture TSM tools for ...
Weekly cybersecurity recap covering emerging threats, fast-moving attacks, critical flaws, and key security developments you ...
Security researchers found two AI-branded VS Code extensions with 1.5M installs that covertly send source code and files to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results