AISURU/Kimwolf launched a record 31.4 Tbps DDoS attack as 2025 saw 47.1M incidents, rising botnet scale, and Android device ...
Key cyber updates on ransomware, cloud intrusions, phishing, botnets, supply-chain risks, and nation-state threat activity.
The elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its ...
Active React2Shell exploitation uses malicious NGINX configurations to hijack web traffic, targeting Baota panels, Asian TLDs, and government domains.
A new Buyer’s Guide for AI Usage Control argues that enterprises have fundamentally misunderstood where AI risk lives.
Critical n8n v CVE-2026-25049 allows authenticated workflow abuse to execute system commands and expose server data.
Microsoft develops a lightweight scanner that detects backdoors in open-weight LLMs using three behavioral signals, improving ...
China-linked Amaranth-Dragon and Mustang Panda target Southeast Asian governments using WinRAR exploit and PlugX phishing ...
Eclipse Foundation to require pre-publish security checks for Open VSX extensions to reduce VS Code supply-chain risk.
DEAD#VAX campaign delivers AsyncRAT via IPFS-hosted VHD phishing files, using fileless memory injection and obfuscated ...
CISA adds an actively exploited SolarWinds Web Help Desk RCE flaw to KEV, ordering federal agencies to patch by February 2026 ...
Early incident response decisions—evidence preservation, execution analysis, and logging visibility—determine investigation ...