Huntress security researchers have uncovered a sophisticated VMware ESXi exploitation campaign using a zero-day toolkit that remained undetected for over…
A decade-long run of selling illegal stalkerware has come to an end for Bryan Fleming, the founder of the Michigan-based…
Jan 08, 2026Ravie LakshmananMalware / Cloud Security Cybersecurity researchers have discovered three malicious npm packages that are designed to deliver…
I’m starting to hear people talk about Claude Code addiction. gasp First, even if that were true, it would still…
Microsoft will start enforcing multi-factor authentication (MFA) for all users accessing the Microsoft 365 admin center starting next month. While…
A critical code injection flaw in Hewlett Packard Enterprise OneView, tracked as CVE-2025-37164, has been added to CISA’s Known Exploited…
A sophisticated modular botnet known as GoBruteforcer is actively targeting Linux servers worldwide, with researchers estimating that more than 50,000…
Chainguard, the trusted source for open source, has a unique view into how modern organizations actually consume open source software…
The UK government has revealed the Government Cyber Action Plan as a renewed effort to close the growing gap between…
Cisco has patched a critical flaw in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that lets…
A groundbreaking cybersecurity research team has developed a novel defensive technique that renders stolen artificial intelligence databases virtually useless to…
Trend Micro has released a critical patch fixing several remotely exploitable vulnerabilities in Apex Central (on-premise), including a flaw (CVE-2025-69258)…