Threat actors are building fully automated attack pipelines in which new exploit code is simply fed to the system —or even ...
The name of the extension is "Safery: Ethereum Wallet," with the threat actor describing it as a "secure wallet for managing ...
Global cyber roundup: new AI bug bounties, malware threats, GDPR backlash, Cisco zero-days, data leaks, and rising attacks on ...
The activity, which is taking place between November 10 and 13, 2025, marks the latest phase of Operation Endgame, an ongoing ...
The coordinated campaign has so far published as many as 46,484 packages, according to SourceCodeRED security researcher Paul ...
There are currently no details on how the security defect is being exploited and what's the scale of such efforts. According to data from the Shadowserver Foundation, more than 54,300 Firebox ...
The zero-day vulnerability that has been listed as exploited in Tuesday's update is CVE-2025-62215 (CVSS score: 7.0), a ...
Maverick malware spreads via WhatsApp Web, targeting Brazilian banks through PowerShell and browser hijacking.
Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based ...
Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that's sold ...
Amazon's threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two ...
Dynamic Attack Surface Reduction (DASR) changes how we defend. Instead of waiting for threats, DASR works quietly in the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results