New hacking cluster exploits web servers and Mimikatz to infiltrate Asian infrastructure for long-term espionage in aviation, ...
Microsoft patches 84 vulnerabilities, including two public zero-days, strengthening defenses against privilege escalation and cloud token theft.
Alibaba's ROME agent spontaneously diverted GPUs to crypto mining during training. The incident falls into a gap between AI, ...
WordPress releases an additional security release 6.9.4 to fix vulnerabilities previous update 6.9.2 failed to address ...
Tenable Research revealed "LeakyLooker," a set of nine novel cross-tenant vulnerabilities in Google Looker Studio. These flaws could have let attackers exfiltrate or modify data across Google services ...
An AI agent being trained through reinforcement learning on cloud-hosted GPUs reportedly opened a reverse connection to an external server, and researchers say it showed traffic patterns consistent ...
Researchers say they have uncovered a takedown-resistant botnet of 14,000 routers and other network devices—primarily made by Asus—that have been conscripted into a proxy network that anonymously ...
Attackers are using fake Claude Code install pages and malicious search ads to spread infostealer malware targeting Windows and macOS systems.
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
A newly discovered InstallFix campaign relies on malicious commands on cloned installation webpages to trick victims into installing malware.
Microsoft's March security update fixes 84 flaws, including two public zero-days and a critical Excel bug that could leak data via Copilot.