A cybersecurity researcher has released a proof-of-concept exploit for a Windows privilege escalation zero-day dubbed ...
The Tycoon2FA phishing kit now supports device-code phishing attacks and abuses Trustifi click-tracking URLs to hijack ...
A security researcher claims Microsoft quietly fixed an Azure Backup for AKS vulnerability after rejecting his report, and ...
The Russian hacker group Secret Blizzard has developed its long-running Kazuar backdoor into a modular peer-to-peer (P2P) ...
On Thursday, Microsoft shared mitigations for a high-severity Exchange Server vulnerability exploited in attacks that allow ...
Stolen browser sessions and authentication tokens are becoming more valuable than stolen passwords. Flare explains how the ...
Two vulnerabilities in the Avada Builder plugin for WordPress, with an estimated one million active installations, allow ...
Microsoft is updating the Edge web browser to ensure it no longer loads saved passwords into process memory in clear text at ...
Hackers have injected credential-stealing malware into newly published versions of node-ipc, a popular inter-process communication package, in a new supply chain attack targeting npm. The node-ipc ...
An 18-year-old flaw in the NGINX open-source web server, discovered using an autonomous scanning system, can be exploited for ...
During the second day of Pwn2Own Berlin 2026, competitors collected $385,750 in cash awards after exploiting 15 unique zero-day vulnerabilities in multiple products, including Windows 11, Microsoft ...
Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability (known as Fragnasia ...