-
Compromised home routers in 30+ countries had DNS traffic redirected, sending users to malicious sites while normal browsing appeared unaffected.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Red teaming has undergone a radical evolution. Modern organizations can no longer rely solely on human creativity or…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers recently tracked a high-speed cloud attack where an intruder gained full admin access in just eight minutes. Discover how AI automation and a simple storage error led to a major security breach.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
ANY.RUN experts report a surge in phishing campaigns abusing trusted cloud and CDN platforms to bypass security controls and target enterprise users.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new campaign by the Russian-linked group APT28, called Op Neusploit, exploits a Microsoft Office flaw to steal emails for remote control of devices in Ukraine, Slovakia, and Romania.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Moltbook is a new social platform where AI agents post and interact while humans observe, raising questions about autonomy, security, and agent behavior.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Everest ransomware claims a breach involving legacy Polycom systems later acquired by HP Inc., alleging the theft of 90GB of internal data.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A multi-stage phishing campaign is targeting business users by exploiting Vercel cloud storage, PDF attachments, and Telegram bots to steal Dropbox credentials.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A months-long breach allowed Chinese State-sponsored hackers to hijack Notepad++ updates in 2025, exposing users to malware via a compromised hosting provider.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


