After a phishing attack, stolen data like credentials and PII is monetized through credential stuffing, darknet markets, identity theft, or used for corporate espionage and further attacks.
After a phishing attack, stolen data like credentials and PII is monetized through credential stuffing, darknet markets, identity theft, or used for corporate espionage and further attacks.
A PromptPwnd attack demonstrated new prompt injection risks. Bug bounty hunters critiqued low macOS payouts. Evidence showed Chinese hackers received Cisco Academy training for espionage.
A PromptPwnd attack demonstrated new prompt injection risks. Bug bounty hunters critiqued low macOS payouts. Evidence showed Chinese hackers received Cisco Academy training for espionage.
OWASP released its Agentic AI Top 10 risks, while CISA and MITRE updated the Most Dangerous Software Weaknesses list for 2024, highlighting prevalent security concerns for AI and traditional software.
OWASP released its Agentic AI Top 10 risks, while CISA and MITRE updated the Most Dangerous Software Weaknesses list for 2024, highlighting prevalent security concerns for AI and traditional software.
Whaling attacks are sophisticated phishing campaigns exclusively targeting top executives, exploiting their authority for significant financial fraud or data exfiltration.
Whaling attacks are sophisticated phishing campaigns exclusively targeting top executives, exploiting their authority for significant financial fraud or data exfiltration.
Adversaries are utilizing custom virtual machines to establish persistent access, a sophisticated method that enhances evasion and provides covert control in compromised systems.
Adversaries are utilizing custom virtual machines to establish persistent access, a sophisticated method that enhances evasion and provides covert control in compromised systems.
Microsoft's new 'in scope by default' policy broadens its bug bounty program, making all vulnerabilities eligible for rewards and enhancing security research.
Microsoft's new 'in scope by default' policy broadens its bug bounty program, making all vulnerabilities eligible for rewards and enhancing security research.
Two men linked to China's Salt Typhoon hacker group reportedly received training at a Cisco 'Academy', revealing insights into state-backed cyber talent.
Two men linked to China's Salt Typhoon hacker group reportedly received training at a Cisco 'Academy', revealing insights into state-backed cyber talent.
Apple released urgent security updates in December 2025, addressing two WebKit vulnerabilities actively exploited in the wild across its device ecosystem.
Apple released urgent security updates in December 2025, addressing two WebKit vulnerabilities actively exploited in the wild across its device ecosystem.
Data leakage is a critical issue for AI, where models inadvertently expose sensitive training data, posing risks to privacy and intellectual property.
Data leakage is a critical issue for AI, where models inadvertently expose sensitive training data, posing risks to privacy and intellectual property.
Microsoft's December 2025 Patch Tuesday addressed 53 vulnerabilities, including three critical flaws in Office, SharePoint Server, and Windows Print Spooler.
Microsoft's December 2025 Patch Tuesday addressed 53 vulnerabilities, including three critical flaws in Office, SharePoint Server, and Windows Print Spooler.
Gladinet Cloud Desktop and CentreStack servers contained critical vulnerabilities enabling unauthenticated and authenticated remote code execution. Patches have been released.
Gladinet Cloud Desktop and CentreStack servers contained critical vulnerabilities enabling unauthenticated and authenticated remote code execution. Patches have been released.
A leaked Home Depot administrator password exposed internal systems for a year on a public code repository before discovery and remediation.
A leaked Home Depot administrator password exposed internal systems for a year on a public code repository before discovery and remediation.
Google Project Zero details an Android in-the-wild (ITW) exploit leveraging a DNG file vulnerability, affecting device security.
Google Project Zero details an Android in-the-wild (ITW) exploit leveraging a DNG file vulnerability, affecting device security.
Supply chain attacks targeting GitHub Actions have significantly increased in 2025, posing new challenges for software development security.
Supply chain attacks targeting GitHub Actions have significantly increased in 2025, posing new challenges for software development security.
A recent GeoServer vulnerability is being actively exploited in attacks, allowing remote code execution and risking data compromise.
A recent GeoServer vulnerability is being actively exploited in attacks, allowing remote code execution and risking data compromise.
Fake GitHub repositories are spreading PyStoreRAT malware by posing as OSINT and GPT utility tools, compromising user systems and data.
Fake GitHub repositories are spreading PyStoreRAT malware by posing as OSINT and GPT utility tools, compromising user systems and data.
Hamas-linked hackers are probing Middle Eastern diplomats in a cyber espionage campaign, targeting sensitive communications and intelligence.
Hamas-linked hackers are probing Middle Eastern diplomats in a cyber espionage campaign, targeting sensitive communications and intelligence.
Fieldtex experienced a data breach impacting 238,000 individuals, leading to exposure of personal data and raising significant privacy concerns.
Fieldtex experienced a data breach impacting 238,000 individuals, leading to exposure of personal data and raising significant privacy concerns.
A Gladinet CentreStack flaw has been actively exploited, leading to organizational compromises. Immediate action is crucial for affected entities.
A Gladinet CentreStack flaw has been actively exploited, leading to organizational compromises. Immediate action is crucial for affected entities.
New advanced phishing kits leverage AI and MFA bypass tactics to steal credentials at scale, posing a significant threat to organizations and users.
New advanced phishing kits leverage AI and MFA bypass tactics to steal credentials at scale, posing a significant threat to organizations and users.
Mac users are targeted via Google Ads to poisoned AI chats distributing the AMOS infostealer. Attackers exploit trust to steal sensitive data.
Mac users are targeted via Google Ads to poisoned AI chats distributing the AMOS infostealer. Attackers exploit trust to steal sensitive data.
Elastic has detected the stealthy NANOREMOTE malware, which uses Google Drive for its command and control (C2) infrastructure, enhancing evasion.
Elastic has detected the stealthy NANOREMOTE malware, which uses Google Drive for its command and control (C2) infrastructure, enhancing evasion.
The ICO has fined LastPass £1.2 million following its 2022 data breach, highlighting significant regulatory action for data protection failures.
The ICO has fined LastPass £1.2 million following its 2022 data breach, highlighting significant regulatory action for data protection failures.
CISA has flagged an actively exploited GeoServer XXE flaw, adding it to the Known Exploited Vulnerabilities catalog, urging immediate mitigation.
CISA has flagged an actively exploited GeoServer XXE flaw, adding it to the Known Exploited Vulnerabilities catalog, urging immediate mitigation.
New React RSC vulnerabilities have been discovered, enabling potential Denial-of-Service attacks and the exposure of application source code.
New React RSC vulnerabilities have been discovered, enabling potential Denial-of-Service attacks and the exposure of application source code.