-
Ivanti has disclosed two critical remote code execution (RCE) flaws (CVE-2026-1281 & CVE-2026-1340) in its EPMM software.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
On December 29, 2025, Poland experienced a significant escalation in coordinated cyberattacks targeting critical energy infrastructure. More than 30 wind and photovoltaic farms, a manufacturing company, and a large combined heat and power plant supplyi…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A pro-Russian hacker alliance calling itself “Russian Legion” has issued direct threats against Denmark, warning of large-scale cyberattacks linked to the country’s planned military support to Ukraine. The campaign appears designed to combine disruptiv…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
We usually think of computer viruses as silent, invisible programs running in the background, but a worrying discovery shows that modern hackers are getting much more personal.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Another day, another Android malware campaign targeting unsuspecting users worldwide by masquerading as popular apps.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A dangerous wave of attacks exploiting CVE-2025-54236, dubbed “SessionReaper,” in Magento e-commerce platforms. This vulnerability lets attackers bypass authentication by reusing invalid session tokens, paving the way for session hijacking …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Pillar Security Research has discovered Operation Bizarre Bazaar, a massive cyberattack campaign led by a hacker known as Hecker. Between December 2025 and January 2026, over 35,000 sessions were recorded targeting AI systems to steal compute power and…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Mac users searching for software on Google or other search engines should be extra careful.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
New research from Point Wild’s Lat61 team reveals how the HEURRemoteAdmin.GoToResolve.gen tool allows silent, unattended access to PCs. Learn why this legitimate remote administration software is being flagged as a security risk and its surprising conn…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A coordinated campaign of 16 malicious GPT optimisers has been caught hijacking ChatGPT accounts. These tools steal session tokens to access private chats, Slack, and Google Drive files.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


