Nearly every major product family needs immediate patching, from Windows to Office to Microsoft Edge, SQL Server, and even ...
CVE-2026-34040 lets attackers bypass some Docker authentication plugins by allowing an empty request body. Present since 2024, this bug was caused by a previous fix to the auth workflow. In the ...
Windows Recall's database may be better protected now, but a new proof of concept suggests the data path after sign in still creates privacy risks for Windows 11 users.
PHANTOMPULSE spreads via Obsidian plugin abuse in REF6598 campaign, targeting finance and crypto users, bypassing AV controls ...
Cargo-stealing hackers have a new trick up their sleeve: using a third-party code-signing service makes their remote ...
AttackIQ has released a new attack graph that emulates the behaviors of NightSpire Ransomware, a financially motivated ...
Discover 10 practical ChatGPT prompts SOC analysts can use to speed up triage, analyze threats, improve documentation, and ...
Chinese hacking group Storm-1175 is compressing ransomware attacks from days into hours by exploiting vulnerabilities before ...
The Medusa ransomware group is operating at a fast pace by leveraging zero-days and quickly exploiting new bugs and breached ...
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...