-
Apple has rolled out an emergency security update, iOS 15.8.7 and iPadOS 15.8.7, to protect users of older iPhones and iPads from a sophisticated threat known as the Coruna exploit kit. Released on March 11, 2026, this critical patch backports several …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Google has released an urgent security update for its Chrome desktop browser to address two critical zero-day vulnerabilities. Tracked as CVE-2026-3909 and CVE-2026-3910, both flaws are categorized as high-severity and are confirmed to be actively expl…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A ransomware intrusion in which attackers used legitimate Windows tools and a renamed backup utility to quietly stage and exfiltrate sensitive data before deploying INC ransomware. The incident highlights how threat actors increasingly rely on “living …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly disclosed set of nine vulnerabilities, dubbed “CrackArmor,” has exposed a critical flaw in AppArmor, a foundational Linux security module. AppArmor serves as the default mandatory access control system for Ubuntu, Debian, SUSE, and …
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Six malicious OphimCMS themes on Packagist have been caught shipping trojanized jQuery and other JavaScript, exposing movie‑streaming sites and their visitors to redirects, URL exfiltration, and aggressive ad schemes tied to sanctioned FUNNULL infrastr…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly discovered hardware vulnerability in the MediaTek Dimensity 7300 chipset is putting millions of Android users at risk. By exploiting this flaw, physical attackers can bypass security layers to steal device PINs, decrypt storage, and extract cry…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Tracking an increased risk of wiper attacks related to the conflict with Iran, including multiple related incidents impacting organizations in Israel and the US. For the latest intelligence on cyberattacks. The campaign uses destructive “wiper” malware…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A newly discovered vulnerability in the GSSAPI Key Exchange patch for OpenSSH is putting multiple Linux distributions at risk. Tracked as CVE-2026-3497, the flaw allows unauthenticated attackers to crash SSH child processes using a single crafted packe…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A recent Remcos RAT campaign showcases how commodity malware has fully embraced fileless, multi‑stage execution to bypass traditional defenses and remain stealthy on compromised Windows systems. Instead of dropping a static executable to disk, the oper…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Artificial intelligence assistants have transformed daily business operations, helping teams manage overflowing inboxes and summarize complex communications. Microsoft Copilot integrates directly into these workflows, pulling context from various Micro…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


