Newsroom | 16/02/2026 - 19:32
With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets.
Newsroom | 16/02/2026 - 14:33
CISA ordered U.S. government agencies on Friday to secure their BeyondTrust Remote Support instances against an actively exploited vulnerability...
Newsroom | 16/02/2026 - 10:19
Google has released emergency updates to fix a high-severity Chrome vulnerability exploited in zero-day attacks, marking the first such security...
Newsroom | 16/02/2026 - 02:29
Threat actors are now abusing DNS queries as part of ClickFix social engineering attacks to deliver malware, making this the first known use of...
Newsroom | 15/02/2026 - 18:30
CTM360 reports 4,000+ malicious Google Groups and 3,500+ Google-hosted URLs used to spread the Lumma Stealer infostealing malware and a trojanized...
Newsroom | 14/02/2026 - 18:02
Threat intelligence observations show that a single threat actor is responsible for most of the active exploitation of two critical...
Newsroom | 14/02/2026 - 00:35
A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers with...
Newsroom | 13/02/2026 - 22:21
Threat actors are abusing Claude artifacts and Google Ads in ClickFix campaigns that deliver infostealer malware to macOS users searching for...
Newsroom | 13/02/2026 - 19:27
A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google...
Newsroom | 13/02/2026 - 19:08
Threat actors are exploiting security gaps to weaponize Windows drivers and terminate security processes in targeted networks, and there may be no...
Newsroom | 13/02/2026 - 14:35
CISA ordered federal agencies on Thursday to secure their systems against a critical Microsoft Configuration Manager vulnerability. This flaw was...
Newsroom | 12/02/2026 - 23:34
A critical pre-authentication remote code execution vulnerability in BeyondTrust Remote Support and Privileged Remote Access appliances is now...
Newsroom | 12/02/2026 - 23:23
The AI-powered product delivers expert-grade malware analysis and reverse engineering in minutes.
Newsroom | 12/02/2026 - 19:09
A critical vulnerability in the WPvivid Backup & Migration plugin for WordPress, installed on more than 900,000 websites, can be exploited to...
Newsroom | 12/02/2026 - 01:15
Microsoft has fixed a "remote code execution" vulnerability in Windows 11 Notepad that allowed attackers to execute local or remote programs by...
Newsroom | 11/02/2026 - 19:40
Cyber resilience means anticipating threats, detecting them early, and recovering fast when incidents occur. Wazuh shows how its open source SIEM...
Newsroom | 11/02/2026 - 19:02
A surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the...
Newsroom | 11/02/2026 - 00:17
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows...
Newsroom | 10/02/2026 - 23:00
Three of those zero-days are security feature bypass flaws, which give attackers a way to slip past built-in protections in multiple Microsoft products.
Newsroom | 10/02/2026 - 20:51
Today is Microsoft's February 2026 Patch Tuesday. It includes security updates for 58 flaws. Among these are 6 actively exploited and three...
Newsroom | 10/02/2026 - 15:00
A new commercial mobile spyware platform dubbed ZeroDayRAT is being advertised to cybercriminals on Telegram as a tool that provides full remote...
Newsroom | 09/02/2026 - 22:28
Hackers are now exploiting SolarWinds Web Help Desk (WHD) vulnerabilities to gain code execution rights on exposed systems and deploy legitimate...
Newsroom | 09/02/2026 - 10:03
BeyondTrust has released updates to address a critical security flaw impacting Remote Support (RS) and Privileged Remote Access (PRA) products. If...
Newsroom | 06/02/2026 - 20:35
A newly discovered toolkit called DKnife has been used since 2019 to hijack traffic at the edge-device level and deliver malware in espionage campaigns.
Newsroom | 06/02/2026 - 19:16
The Cybersecurity & Infrastructure Security Agency (CISA) in the U.S. has issued a warning about CVE-2026-24423. This is an unauthenticated remote...
Newsroom | 06/02/2026 - 11:43
Photo-sharing platform Flickr is notifying users of a potential data breach after a vulnerability at a third-party email service provider exposed...
Newsroom | 06/02/2026 - 10:40
Cybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI)...
Newsroom | 05/02/2026 - 08:16
A new, critical security vulnerability has been disclosed in the n8n workflow automation platform. If successfully exploited, this flaw could...
Newsroom | 04/02/2026 - 23:14
Multiple critical vulnerabilities in the popular n8n open-source workflow automation platform allow escaping the confines of the environment and...
Newsroom | 04/02/2026 - 23:06
By tapping the unusual .scr file type, attackers leverage "executables that don't always receive executable-level controls," one researcher noted.
Newsroom | 04/02/2026 - 19:38
CISA confirmed on Wednesday that ransomware gangs have begun exploiting a high-severity VMware ESXi sandbox escape vulnerability that was...