-
Security researchers have published an in‑depth technical analysis of the DragonForce ransomware operation, along with details of working decryptors for both Windows and ESXi systems targeting specific victims. By the time its dedicated Data Leak Site …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly documented campaign dubbed “Contagious Interview” shows North Korean threat actors weaponising developer tooling and code-repository workflows to steal credentials, cryptocurrency wallets and establish remote access even when victims never “run…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Digital investment advisor Betterment has confirmed that unauthorized individuals gained access to its internal systems in a recent security breach. The compromise allowed attackers to send fraudulent cryptocurrency-related messages to some…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Google has confirmed a critical bug affecting Android devices where volume buttons malfunction when the Select to Speak accessibility feature is enabled. The issue causes volume keys to adjust accessibility volume rather than media volume. It prevents …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A command-injection vulnerability in the Spring CLI VSCode extension allows attackers to execute arbitrary commands on affected user machines. The vulnerability, tracked as CVE-2026-22718, affects all versions …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Elastic has released urgent security patches addressing four significant vulnerabilities in Kibana that could enable attackers to steal sensitive files, trigger service outages, and exhaust system resources. The advisories, published on January 14, 202…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Mandiant has released AuraInspector, an open-source command-line tool designed to help security teams identify and audit access control misconfigurations within the Salesforce Aura framework that could expose sensitive data, including credit card numbe…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Large language models are not fundamentally transforming ransomware operations. However, they are dramatically accelerating the threat landscape through measurable gains in speed, volume, and multilingual capabilities. According to SentinelLABS researc…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Security researchers are sounding the alarm over CastleLoader, a stealthy first-stage malware loader now implicated in campaigns targeting US-based government entities and multiple high-value industries. According to a recent deep-dive by ANY.RUN’s mal…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Google has launched Chrome 144 for desktop platforms, addressing ten security vulnerabilities including multiple high-severity flaws in the V8 JavaScript engine. The stable channel update began rolling out on January 13, 2026, for Windows, Mac, and Lin…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


