News
The Windows RPC protocol utilizes universally unique identifiers (UUIDs) and an Endpoint Mapper (EPM) to enable the use of ...
Researchers bypass GPT-5 guardrails using narrative jailbreaks, exposing AI agents to zero-click data theft risks.
Lenovo webcam flaws let attackers deploy remote BadUSB exploits, risking keystroke injection and persistent malware.
Researchers found ReVault flaws in Dell ControlVault3 affecting 100+ laptop models, risking login bypass and key theft.
AI-powered phishing mimics Brazilian agencies, stealing data and PIX payments; Efimer Trojan targets crypto wallets.
Cybersecurity researchers have discovered over a dozen vulnerabilities in enterprise secure vaults from CyberArk and ...
Leaked credentials caused 22% of 2024 breaches, with a 160% rise in 2025, highlighting urgent detection needs.
RubyGems and PyPI hit by credential-stealing packages targeting automation and crypto users, prompting new security rules.
A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that are ...
SonicWall confirms recent SSL VPN attacks link to patched CVE-2024-40766 and reused passwords, urging password resets.
Claroty said it found more than 6,500 servers that expose the proprietary Axis.Remoting protocol and its services over the ...
Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence (AI) is both a weapon ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results