A substantial expansion in cybercrime operations using tactics consistent with ShinyHunters-branded extortion campaigns. These sophisticated operations employ advanced voice phishing…
Research from watchTowr reveals these zero-day vulnerabilities are being actively exploited. Apply the emergency RPM patch now. Cybersecurity researchers are…
Hackers exploit unsecured MongoDB instances to wipe data and demand ransom Pierluigi Paganini February 02, 2026 Over 1,400 exposed MongoDB…
/*UPDATE */ @irsdl brought two import links to my attention: 2010 formcalc: http://t.co/6OfGLa9Cu1 2013 XXE + SOP Bypass: http://t.co/VZMSVg3HtN It seems like Adobe…
Chinese state-sponsored threat actors were likely behind the hijacking of Notepad++ update traffic last year that lasted for almost half…
21,000+ publicly exposed instances of an open-source personal AI assistant, raising significant concerns about unprotected access to sensitive user configurations…
A critical vulnerability in Moltbook, the AI agent social network launched in late January 2026 by Octane AI’s Matt Schlicht,…
What is mhtml ? For those who have never saved a complete web page in Internet Explorer, mhtml or its…
The data breach notification service Have I Been Pwned says that a data breach at the U.S. food chain Panera…
A new wave of attacks targeting Windows systems has emerged through a sophisticated remote access trojan known as Pulsar RAT….
AutoPentestX, an open-source automated penetration testing framework designed to streamline vulnerability assessment and security testing workflows on Linux systems. The…
A massive legal battle is brewing that could fundamentally change how we access music online. As reported by Hackread.com in…
