ASD and Five-Eyes spy agencies alert on exploited Cisco SD-WAN zero-day
Attackers are exploiting a serious vulnerability in Cisco Catalyst software defined wide area network (SD-WAN) devices that enable them to bypass authentication. On top of…
Attackers are exploiting a serious vulnerability in Cisco Catalyst software defined wide area network (SD-WAN) devices that enable them to bypass authentication. On top of…
Attackers have been exploiting a pair of zero-day vulnerabilities in Cisco’s network edge software for at least three years, and the global campaign is ongoing,…
American manufacturer of medical devices, UFP Technologies, has disclosed that a cybersecurity incident has compromised its IT systems and data. UFP Technologies is a publicly traded…
Untrusted repositories turn Claude code into an attack vector Pierluigi Paganini February 25, 2026 Flaws in Anthropic’s Claude Code could allow remote code execution and…
A coordinated campaign targeting software developers with job-themed lures is using malicious repositories posing as legitimate Next.js projects and technical assessment materials, including recruiting coding tests.…
Critical Zyxel router flaw exposed devices to remote attacks Pierluigi Paganini February 25, 2026 Zyxel fixed a critical flaw in multiple routers that lets unauthenticated…
Google disrupted a Chinese-linked hacking group that breached at least 53 organisations across 42 countries, the company said Wednesday. The hacking group, tracked as UNC2814…
A newly disclosed research finding has revealed that Palo Alto Networks’ Cortex XDR Live Terminal feature can be turned into a command-and-control (C2) channel by…
For a long time, contract lifecycle management software was the default answer to the question of how organizations should manage their agreements. Contract Lifecycle Management…
At least 75 Australian businesses with a turnover of more than $3 million have admitted paying off ransomware groups in the first eight months of…
Cybercriminals are frequently refining their techniques to exploit consumer trust, and a highly sophisticated phishing campaign has recently surfaced that impersonates the cybersecurity firm Avast.…
The United States government has launched a crackdown on a global network accused of stealing and selling sensitive cyber tools used for national security. In…