The memory leak security vulnerability allows unauthenticated attackers to extract passwords and tokens from MongoDB servers.
Threat actors are exploiting complex routing scenarios and misconfigured spoof protections to send spoofed phishing emails, ...
The known RAT aimed at gamers is now targeting security professionals searching GitHub for PoCs and exploit codes.
The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for ...
First 2026 cyber recap covering IoT exploits, wallet breaches, malicious extensions, phishing, malware, and early AI abuse.
The explosive, easy-to-trigger vulnerability was exploited within hours of disclosure, exposing the risks of default ...
LONDON, Jan. 5, 2026 /PRNewswire/ -- 2025 saw a surge in AI-enabled cyberthreats as adversaries weaponised generative models to produce polymorphic malware, insider-style phishing, and increasingly ...
Example of a PDF attachment with a QR code. Malicious QR codes commonly appear in mass phishing campaigns as well as targeted ...
A recently disclosed vulnerability affecting MongoDB instances has been reportedly exploited in the wild. Exploit code has been released for this flaw dubbed MongoBleed.Key takeaways:MongoBleed is a ...
With over 500,000 attendees, PennCyber highlights potential threats. Are your devices secure? Discover how to protect ...
Ubisoft is reeling from a security crisis that goes far beyond simple gameplay exploits. While the community focuses on ...