Zoom Update Scam Infected 1,437 Users to Deploy Surveillance Tools in 12 Days
A cleverly crafted fake Zoom website has silently pushed surveillance software onto Windows machines, infecting 1,437 users globally in just 12 days. The campaign, first…
A cleverly crafted fake Zoom website has silently pushed surveillance software onto Windows machines, infecting 1,437 users globally in just 12 days. The campaign, first…
A highly sophisticated and previously unreported threat campaign dubbed SeaFlower (藏海花) has been actively targeting users of popular Web3 cryptocurrency wallets, embedding stealthy backdoors into…
A newly discovered Android Remote Access Trojan (RAT) named Oblivion is raising serious concerns across the mobile security community. Sold on a public hacking forum…
A newly documented Android spyware called ResidentBat has been linked to the Belarusian KGB, giving state operators deep and persistent access to the mobile devices of journalists…
The cybersecurity threat landscape is facing a growing challenge as infostealers continue to dominate the initial access ecosystem in 2026. Among the latest threats drawing…
Claude Code Remote Control From Phone Anthropic has launched a new “Remote Control” feature for its agentic terminal tool, Claude Code. His capability allows developers…
ServiceNow AI Platform Vulnerability A critical vulnerability in an enterprise AI platform has been patched, addressing a flaw that could allow unauthenticated remote code execution.…
OpenAI has officially confirmed that a ChatGPT account linked to an individual associated with Chinese law enforcement was used to plan and document large-scale covert…
27 Years old Telnet Enables Attackers Gain Root Access A newly confirmed vulnerability in the telnet daemon (telnetd) in GNU Inetutils has revived a 27-year-old…
Firefox 148 Released With Sanitizer API Firefox 148 introduces the new standardized Sanitizer API, becoming the first browser to implement it. The update marks a…
Claude Code Vulnerabilities A critical security flaw in Anthropic’s Claude Code demonstrates how threat actors can exploit repository configuration files to execute malicious code and…
A proof-of-concept (PoC) exploit has been publicly released for CVE-2026-2636, a newly documented vulnerability in Windows’ Common Log File System (CLFS) driver that allows any low-privileged,…