A security flaw in “Claude in Chrome” enables any Chrome extension, including those without permissions, to execute ...
A critical vulnerability affecting certain configurations of the Exim open-source mail transfer agent could be exploited by ...
A suspected China-linked threat actor targeted the Indian branch of a global manufacturer leveraging an open source offensive ...
F5’s May 2026 quarterly security notification details 51 high and medium-severity vulnerabilities impacting BIG-IP, BIG-IQ, ...
Fortinet has released security patches for two critical vulnerabilities in FortiSandbox and FortiAuthenticator that could ...
CVE-2026-41940 exploitation by 2,000 IPs enabled Filemanager backdoor attacks, causing credential theft and persistent access ...
Attackers are increasingly abusing Microsoft’s legacy MSHTA utility to silently deliver malware, stealers, and persistent ...
CVE-2026-22679 exploited via debug endpoint in Weaver E-cology before 20260312, enabling RCE and system compromise.
A new banking trojan is reportedly targeting 59 banking, fintech and cryptocurrency platforms while spreading through popular ...
Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft ...
Security researchers say a new macOS infostealer called SHub Reaper disguises itself as Apple security software to steal passwords, cryptocurrency wallets, and sensitive files. The malware abuses ...
GitHub confirmed an attacker was able to access its internal repositories after a code extension breach, with TeamPCP ...