CVE-2025-32975 exploited since March 2026 on unpatched KACE SMA systems, enabling admin takeover and payload delivery.
Threat actors have demonstrated just how quickly they operate today after exploiting a critical open source vulnerability ...
Russia-linked APT28 has exploited a high-severity XSS vulnerability in Zimbra in attacks against Ukrainian entities.
Crypto scammers are exploiting the rising visibility of OpenClaw to target developers through a coordinated phishing campaign ...
Hackers exploited a compromised npm package to breach cloud systems and gain full AWS administrator access within 72 hours.
UNC6426 used stolen GitHub tokens from the 2025 nx npm breach to gain AWS admin access in under 72 hours, enabling data theft ...
The dashboard designed to command your servers could double as a control panel for attackers. A newly disclosed Windows Admin Center flaw carries a CVSS score of 8.8 and could let an authorized user ...
This voice experience is generated by AI. Learn more. This voice experience is generated by AI. Learn more. Did you take advantage of a recent coin exploit in ARC Raiders? Well, you may be about to be ...
Threat actors now have the ability to exploit a new zero-day vulnerability in the Chrome browser, Google has advised IT administrators. The warning comes after Google released a patch for Chrome to ...
The time between vulnerability disclosure and exploitation has plunged 94% over the past five years as threat actors weaponize so-called “n-days,” according to a new Flashpoint study. The threat ...
Microsoft has quietly tightened Windows 11’s security model, and the latest change is already raising eyebrows. The Storage settings page — a core part of managing disk space, cleanup tools, and ...