Iranian APT Infy resurfaced after years of silence, using updated Foudre & Tonnerre malware, phishing delivery, resilient C2 ...
Android attackers use fake apps and droppers to spread the Wonderland SMS stealer, stealing OTPs, SMS data, and bank funds, ...
Attackers are exploiting a Flight protocol validation failure that allows them to execute arbitrary code without ...
Explore the top cybersecurity predictions for 2026, from AI-driven threats to predictive SOCs and new risks to trust, ...
A ransomware gang exploited the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate ...
A new malware implant called EtherRAT, deployed in a recent React2Shell attack, runs five separate Linux persistence ...
The React2Shell vulnerability enables remote code execution on systems using React or Next.js. This allows threat actors worldwide to exploit this "open door" to deliver various malicious payloads.
Threat actors are still abusing Visual Studio Code extensions as an entry point, with the latest fake Prettier incident ...
An investigation into the AI 171 crash reveals cascading electrical failures in the core network of a Boeing 787, raising ...
Water Balance Test, Functional-Zone Analysis, Water-Use Efficiency, Behavioral Participation, Digital Monitoring Share and ...
A new SantaStealer infostealer has been released in the wild, with the “ready-to-go” Windows targeting malware offered for ...
The new ransomware employs deceptive system update screens to trick victims and can stream and remotely control devices via ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results