Within days of Microsoft patching a critical Office zero-day, the Russia-linked group “APT28” was already exploiting the flaw in a live campaign tracked as Operation Neusploit.
Once deployed on corporate networks, AI agents can become every threat actor's fantasy. Lesson one for cybersecurity pros: limit privileges.
JFrog security researchers have exposed two critical vulnerabilities (CVE-2026-1470, rated 9.9; and CVE-2026-0863, rated 8.5) in the n8n workflow automation platform.
Active attacks exploit Metro4Shell (CVE-2025-11953) in React Native CLI to execute commands and deploy Rust malware.
Threat actors are exploiting the Metro4Shell React Native vulnerability to deploy malware on Linux and Windows systems.
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native ...
When exploited, the flaw can enable an attacker to bypass object linking and embedding mitigations in Microsoft 365 and ...
Here we'll try to look at and discuss the Seattle Seahawks' fatal flaw that the Patriots must exploit in Super Bowl LX.
APT28's attacks use specially crafted Microsoft Rich Text Format (RTF) documents to kick off a multistage infection chain to deliver malicious payloads.
Ukraine's Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.
Russia-linked hacking group Fancy Bear is exploiting a brand-new vulnerability in Microsoft Office, CERT-UA says ...
How AI and agentic AI are reshaping malware and malicious attacks, driving faster, stealthier, and more targeted ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results