Inside Nexcorium: How CVE-2024-3721 Fuels a New Wave of Mirai-Based DDoS Botnets
Researchers have uncovered an active IoT botnet campaign exploiting two known command-injection vulnerabilities to recruit surveillance cameras and home routers…
Researchers have uncovered an active IoT botnet campaign exploiting two known command-injection vulnerabilities to recruit surveillance cameras and home routers…
Threat actors are increasingly moving faster than ever in ransomware operations, shrinking the time between initial compromise and ransomware deployment…
The second Tuesday of April 2026 marked another extensive security update release from Microsoft, addressing a broad range of vulnerabilities…
CVE-2026-5194 is a critical vulnerability affecting the wolfSSL cryptographic library, a widely used TLS/SSL implementation deployed across embedded systems, IoT…
The Russian state-linked threat actor APT28 (also known as Forest Blizzard and Pawn Storm) has intensified its cyber operations through…
Adobe has released emergency security updates to address a critical vulnerability in Adobe Acrobat Reader, tracked as CVE-2026-34621. This flaw,…
Cybercriminals are increasingly exploiting trusted enterprise collaboration platforms through supply-chain style attacks, with a newly discovered zero-day vulnerability in the…
A pair of critical vulnerabilities in Cisco server and license-management technologies, CVE-2026-20093 and CVE-2026-20160. These flaws allow attackers to bypass…
Cybercriminal and nation-state threat actors are increasingly shifting toward developer-ecosystem compromise and software supply chain abuse as a reliable avenue…
The discovery of CVE-2026-5281 reveals critical vulnerability highlights a serious weakness in modern web browsers that can be leveraged by…