The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijacking. [...]
AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity. [...]
A Spanish court has granted precautionary measures against NordVPN and ProtonVPN, ordering the two popular VPN providers to block 16 websites that facilitate piracy of football matches. [...]
Vulnerabilities with high to critical severity ratings affecting popularΒ Visual Studio Code (VSCode) extensions collectively downloaded more than 128 million timesΒ could be exploited to steal local files and execute code remotely. [...]
Notepad++ has adopted a "double-lock" design for its update mechanism to address recently exploited security gaps that resulted in a supply-chain compromise. [...]
Eurail B.V., the operator that provides access to 250,000 kilometers of European railways, confirmed that data stolen in a breach earlier this year is beingΒ offered for sale on the dark web. [...]
With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malwareΒ has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets. [...]
Threat intelligence observations show that aΒ single threat actor is responsible for most of the active exploitation of two critical vulnerabilities inΒ Ivanti Endpoint Manager Mobile (EPMM), tracked asΒ CVE-2026-1281 and CVE-2026-1340. [...]
Google Threat Intelligence Group (GTIG) has published a new report warning about AI model extraction/distillation attacks, in which private-sector firms and researchers use legitimate API access to systematically probe models and replicate their logic and reasoning. [...]
The Netherlands Police have arrested aΒ a 21-year-old man from Dordrecht, suspected of selling access to the JokerOTPΒ phishing automation tool that can intercept one-time passwords (OTP) for hijacking accounts. [...]
AΒ surge in LummaStealer infections has been observed, driven by social engineering campaigns leveraging the ClickFix technique to deliver the CastleLoader malware. [...]
A newly documented Linux botnet named SSHStalker is using the IRC (Internet Relay Chat) communication protocol for command-and-control (C2) operations. [...]
North Korean hackers are running tailored campaigns using AI-generated video and the ClickFix technique to deliver malware for macOS and Windows to targets in the cryptocurrency sector. [...]
A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user's computer into a residential proxy node. [...]
Volvo Group North America disclosed that itΒ suffered an indirect data breach stemming from the compromise of IT systems at American business services giant Conduent, of which Volvo is a customer. [...]
A new commercial mobile spyware platform dubbed ZeroDayRAT is being advertised to cybercriminals on Telegram as a tool that provides full remote control over compromised Android and iOS devices. [...]
The Chinese threat actor tracked as UNC3886 breached Singapore's four largest telecommunication service providers, Singtel, StarHub, M1, and Simba, at least once last year. [...]