ToddyCat, a sophisticated cyber-espionage threat group also known as Websiic and Storm-0247, has emerged as a significant risk to organizations…
A new wave of GoBruteforcer botnet malware attacks is targeting databases of cryptocurrency and blockchain projects on exposed servers believed to be…
A sophisticated phishing campaign is exploiting Google Cloud infrastructure to bypass email security filters and steal Microsoft 365 credentials, demonstrating…
OpenAI has promised that it won’t use your private health information and conversations to train its AI models, as it…
A critical security flaw has been discovered in the TOTOLINK EX200 Wi-Fi extender that allows attackers to gain complete control…
Researchers warn that a critical vulnerability in n8n, an automation platform that allows organizations to integrate AI agents, workflows and…
Chinese threat actors are conducting an aggressive campaign that distributes NFC-enabled Android malware capable of intercepting and remotely relaying payment…
This story contains descriptions of explicit sexual content and sexual violence. Elon Musk’s Grok chatbot has drawn outrage and calls…
A sophisticated new ransomware variant, CrazyHunter, has emerged as a critical threat to the healthcare sector, employing advanced anti-malware evasion…
Ni8mare flaw gives unauthenticated control of n8n instances Pierluigi Paganini January 07, 2026 A critical n8n flaw (CVE-2026-21858, CVSS 10.0),…
Here are the biggest changes I see coming to AI in 2026. And when I say “verifiable,” I don’t mean…
The jsPDF library for generating PDF documents in JavaScript applications is vulnerable to a critical vulnerability that allows an attacker…