CVE-2026-32202 actively exploited after April 27 advisory fix, exposing NTLMv2 hashes via zero-click SMB authentication.
An attacker pushed a malicious version of the popular elementary-data package Python Package Index (PyPI) to steal sensitive ...
PhantomCore exploited three TrueConf flaws since September 2025, enabling remote access and lateral movement across Russian ...
When 500,000 Findings Hide 14 Real Threats Modern enterprises ingest vulnerability data from dozens of sources: endpoint ...
Unsafe defaults in MCP configurations open servers to possible remote code execution, according to security researchers who ...
Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware ...
A critical Nginx UI vulnerability that allows attackers to take full control of servers has been exploited in the wild.
Malwarebytes recently uncovered a new malicious campaign targeting the Windows Update service. Focused on French-speaking users, the campaign uses layered obfuscation techniques to deliver multiple ...
The Linux-based ELF backdoor is targeting cloud workloads across providers, using SMTP-based C2 and typosquatted Alibaba domains to harvest credentials and metadata.
The footnote is on page 7 of a 60-page alignment risk report, wedged between paragraphs about sandbox configuration and exploit sophistication. It say.
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...