-
Warning for EmEditor users: A third-party breach tampered with the official download link between Dec 19–22, 2025. Learn how to identify the fake installer and protect your data from infostealer malware.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Check Point researchers found a phishing scam abusing Google Cloud to target organisations worldwide. Scammers use official domains to steal logins. Read the full details in this exclusive report.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Over 87,000 MongoDB instances are at risk from a critical memory leak called MongoBleed. Following the chaos at Ubisoft, see how this zero-password flaw works and how to protect your data.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers reveal CVE-2025-54322, a critical unpatched flaw in XSpeeder networking gear found by AI agents. 70,000 industrial and branch devices are exposed.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A hacker using the alias “Lovely” has leaked what they claim is the personal data of over 2.3…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
On December 25, while much of the world was observing Christmas, the Everest ransomware group published a new…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Koi Security uncovers lotusbail, a malicious npm package with 56K downloads that steals WhatsApp messages and installs a persistent backdoor. Learn how to protect your data.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers discovered critical flaws in Eurostar’s AI chatbot including prompt injection, HTML injection, guardrail bypass, and unverified chat IDs – Eurostar later accused them of blackmail.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Jamf security experts have found a new version of MacSync Stealer. Disguised as a zk-call app, it uses official notarization to bypass security and steal your saved passwords.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


