Malicious email delivers advanced malware with privilege escalation and evasion tactics
The attack chain begins with a user receiving an email containing a URL that downloads an encoded .cmd file.
Aggregating 4173 articles from trusted cybersecurity sources
The attack chain begins with a user receiving an email containing a URL that downloads an encoded .cmd file.
The BlueHammer vulnerability is a local privilege escalation (LPE) flaw that combines a time-of-check to time-of-use (TOCTOU) vulnerability with path confusion.
A critical DoS vulnerability in the Framework component of Android has also been fixed with the latest update. The post Severe StrongBox Vulnerability Patche...
Hackers targeted the Uffizi Galleries in February 2026, allegedly stealing the museum's entire photographic archive.
Charming Kitten, associated with Iran's security apparatus, targets officials, researchers, and corporate employees by impersonating trusted contacts.
Automated pentesting tools deliver strong early results, then quickly plateau. Picus Security explains how the "PoC cliff" leaves major attack surfaces untes...
Officials said the activity centers on compromising small office and home office routers and similar network devices exposed to the internet, often because o...
GrafanaGhost chains AI prompt injection and URL flaws to exfiltrate sensitive Grafana data
Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment lik...
By targeting Grafana’s AI components, attackers can point to external resources and inject indirect prompts to bypass safeguards. The post GrafanaGhost: Atta...
A major outage hit Russian banking apps and payments, blocking card use, cash withdrawals, and mobile access for hours. A widespread outage disrupted banking...
Noma Security researchers used indirect prompt injection to turn Grafana's own AI into an unwitting courier for sensitive corporate data. The post ‘GrafanaGh...
Bluesky is back online after a roughly 24-hour DDoS attack disrupted services, with the Iran-linked 313 Team claiming responsibility and no data breach repor...
SEC rules require fast breach reporting and stronger cyber risk disclosures.
Cloud development platform Vercel has confirmed a security incident involving unauthorized access to parts of its internal systems, following a breach disclo...
The French National Agency for Secure Documents (ANTS) has officially confirmed a severe data breach affecting its central government portal. This critical i...
A group of unauthorized users has successfully bypassed access controls to reach Claude Mythos Preview, Anthropic’s closely guarded cybersecurity AI. This br...
Major Dutch online store Bol, which also operates in Belgium, had information from more than 400,000 of its Belgian users allegedly compromised by the hacker...
France Titres, the government agency in France for issuing and managince administrative documents has disclosed a data breach after a threat actor claimed th...
The attackers asserted they breached Seiko USA's Shopify backend, exfiltrating sensitive customer data including names, email addresses, phone numbers, order...
Vercel released a statement acknowledging a breach and warning a “limited subset of customers” that their Vercel credentials were compromised.
Grinex exchange collapses after $13.7M breach, blames Western spies as Chainalysis flags possible exit scam and sanctions evasion network links claims.
Cloud app developer Vercel appears to have suffered a security breach
The popular AI application builder, Lovable, is currently facing a massive data breach due to an unpatched API vulnerability. Security researchers have revea...