33 articles
A buffer overflow flaw in NGINX is being actively exploited, putting global web servers at risk of potential remote attacks.
The state-sponsored group Turla has transformed its Kazuar backdoor into a sophisticated P2P botnet, heightening the risk of persistence and espionage within compromised networks.
Security researchers demonstrated critical flaws in Windows 11 and Microsoft Edge during the first day of Pwn2Own Berlin 2026, earning $523,000.
The FamousSparrow group perpetrated multiple intrusions against an oil company in Azerbaijan, highlighting persistent risks in mail servers.
The CVE-2026-45185 vulnerability, known as Dead.Letter, threatens Exim servers. Update your system to avoid risks of remote code execution.
Google has revealed the use of AI to create a zero-day exploit, setting a dangerous precedent for cybersecurity and the vulnerability of 2FA systems.
A new malvertising campaign is using Google ads and Claude.ai chats to infect Mac devices with malicious software.
U.S. federal agencies have four days to mitigate a severe security flaw in Ivanti EPMM that is already being exploited.
State-sponsored hackers exploited a critical vulnerability in Palo Alto Networks firewalls for almost a month, exposing thousands of companies.
The MuddyWater group is using Microsoft Teams to infiltrate systems and deploy ransomware, complicating attribution through false flag tactics.
The state-sponsored group ScarCruft has compromised a video game platform to deploy the BirdCall backdoor on Windows and Android systems via a supply chain attack.
The Silver Fox group is deploying the ABCDoor malware through tax-themed phishing campaigns targeting organizations in India and Russia.
Questions, suggestions or proposals — write to us and we will respond.
We received your message. We will respond as soon as possible.