Threat actors are leveraging a dangerous new campaign that weaponizes ordinary-looking shipping documents to distribute Remcos, a powerful remote access…
The UK’s National Cyber Security Centre reports ongoing cyber operations by Russian-aligned hacktivist groups targeting organizations in the UK and…
The recently discovered sophisticated Linux malware framework known as VoidLink is assessed to have been developed by a single person…
Microsoft is rolling out a new security feature called the External Domains Anomalies Report for Teams, designed to help IT…
Cryptocurrency thieves have found a new way to turn trusted software packages for Linux on the Snap Store into crypto-stealing…
Ravie LakshmananJan 21, 2026Vulnerability / Artificial Intelligence Security vulnerabilities were uncovered in the popular open-source artificial intelligence (AI) framework Chainlit…
Threat actors linked to North Korea have continued to expand their attack capabilities by weaponizing Microsoft Visual Studio Code, one…
cside announced the launch of Privacy Watch. The platform prevents website privacy violations on the client-side, a risk surface that…
VoidLink shows how one developer used AI to build a powerful Linux malware Pierluigi Paganini January 21, 2026 VoidLink is…
A critical remote authentication bypass vulnerability has been disclosed in GNU InetUtils affecting the telnetd server component. The flaw, reported…
A sophisticated phishing campaign exploiting LinkedIn private messages has been identified, delivering remote access trojans (RATs) through a combination of…
A new Stable-channel release of Chrome version 144 addresses a high-severity vulnerability in the V8 JavaScript engine. The update, version…