A sophisticated new ransomware-as-a-service operation called Chaos that emerged in February 2025, employing advanced social engineering tactics and legitimate tools…
A concerning vulnerability in Cursor's Background Agents that allowed them to gain complete control over the underlying Amazon EC2 infrastructure.…
A routine investigation by security researchers at Assetnote has uncovered a series of critical vulnerabilities in Hexagon ETQ’s Reliance, an…
The Federal Bureau of Investigation has issued a stark warning about an evolving cybercriminal ecosystem called "Hacker Com," a sophisticated…
A Metasploit exploit module targeting critical zero-day vulnerabilities in Microsoft SharePoint Server that are currently being exploited in the wild.…
A sophisticated supply chain attack targeting developers emerged on Friday, July 18, 2025, when cybercriminals compromised several popular npm packages,…
TP-Link has disclosed critical security vulnerabilities in two of its VIGI network video recorder (NVR) models that could allow attackers…
German industrial automation company Weidmueller Interface GmbH & Co. KG has disclosed multiple critical vulnerabilities affecting its IE-SR-2TX series of…
Cybersecurity researchers at AhnLab Security Intelligence Center (ASEC) have identified a sophisticated campaign targeting poorly secured Linux servers through SSH…
Amazon Web Services has addressed a critical security vulnerability in its Client VPN software for Windows that could allow attackers…