APT28 rushed to exploit the Office vulnerability CVE-2026-21509, with the first attacks observed just days after Microsoft announced fixes.
Microsoft has released emergency security updates to patch a high-severity Office zero-day vulnerability exploited in attacks ...
Decentralised finance protocol CrossCurve has identified ten Ethereum wallet addresses involved in the exploit of its bridge ...
Volt Typhoon Hackers Exploit Zero-Day Vulnerability in Versa Director Servers Used by MSPs, ISPs Your email has been sent Volt Typhoon, a Chinese state-sponsored hacking group, has been caught ...
To exploit the vulnerability, an attacker would need either system access or be able to convince a user to open a malicious ...
The AI bot OpenClaw, also known as Moltbot, can do a lot on user computers. A code smuggling vulnerability within it is ...
Apply fixes within a few hours or face the music, say the pros What good is a fix if you don't use it? Experts are urging ...
New research by cybersecurity firm Mandiant provides eyebrow-raising statistics on the exploitation of vulnerabilities by attackers, based on an analysis of 138 different exploited vulnerabilities ...
Cisco has fixed a critical Unified Communications and Webex Calling remote code execution vulnerability, tracked as ...
Public-facing instances of ProjectSend, an open-source file-sharing web application, have been exploited by attackers, according to vulnerability intelligence provider VulnCheck. ProjectSend was ...
Ivanti's enterprise VPN solution faces another instance of active exploitation due to a recent vulnerability, marking the third flaw discovered in Ivanti's Connect Secure VPN. One of the newly ...
The availability of an exploit that takes advantage of a critical vulnerability in Microsoft Corp.’s Windows 2000 software just a day after the flaw was disclosed is fueling concerns of another ...