Langflow CVE-2026-33017 exploited in 20 hours after disclosure, enabling RCE via exec(), exposing systems before patching cycles.
Qualys reports the discovery by their threat research unit of vulnerabilities in the Linux AppArmor system used by SUSE, Debian, Ubuntu, and ...
Sysdig cited figures from the Zero Day Clock initiative which revealed that median time-to-exploit (TTE) collapsed from 771 ...
Cloud attacks are getting faster and deadlier - here's your best defense plan ...
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window for attacks shrinking from weeks to just days.
The Cybersecurity and Infrastructure Security Agency has ordered federal agencies to patch three critical iOS vulnerabilities that were exploited over a 10-month span in hacking campaigns conducted by ...
Google finds iPhone exploit kit targeting crypto wallet seed phrases. Coruna toolkit attacks older iOS devices via fake crypto sites. Exploit linked to espionage and crypto theft campaigns. Security ...
Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized ...
Embark Studios is keeping its promise to take action against players who took advantage of duplication exploits and other glitches in Arc Raiders by issuing warnings and suspensions. The developer ...