A critical vulnerability in HIKVISION's applyCT security management platform that could allow attackers to execute arbitrary code on affected systems…
A recent wave of sophisticated phishing attacks has successfully bypassed traditional email security measures by exploiting a lesser-known feature within…
Critical security vulnerabilities have been discovered in PHP's PostgreSQL and SOAP extensions that could enable SQL injection attacks and denial…
Amid heightened tensions between Iran and Israel, cybersecurity researchers have uncovered a sophisticated and ongoing cyber-espionage campaign targeting Israeli journalists,…
A sophisticated method to bypass Content Security Policy (CSP) nonces, a widely-used web security mechanism designed to prevent cross-site scripting…
A recent security investigation by Semperis has uncovered a critical vulnerability in Microsoft Entra ID (formerly Azure Active Directory) integrations,…
A major security vulnerability in the Android stalkerware service Catwatchful has exposed the plaintext login credentials of over 62,000 users,…
A new credential-harvesting malware known as “123 | Stealer” has surfaced on a prominent English-speaking cybercrime forum, with the threat…
In a striking example of the evolving landscape of cyber warfare, Iranian state-linked hackers have launched a highly sophisticated global…
Cybercriminals are rapidly adopting artificial intelligence (AI) technologies, specifically large language models (LLMs), to streamline and amplify their illicit activities. …