SloppyLemming targeted Pakistan and Bangladesh with BurrowShell, a Rust keylogger, and 112 Cloudflare Workers domains in 2025 ...
Chrome CVE-2026-0628 let malicious extensions hijack Gemini panel for privilege escalation, local file access, and ...
North Korean-linked campaign publishes 26 malicious npm packages hiding C2 in Pastebin, deploying credential stealers & RAT ...
Google is testing Merkle Tree Certificates in Chrome to enable quantum-resistant HTTPS, reduce TLS handshake data & launch a ...
APT28 exploited CVE-2026-21513, an MSHTML zero-day (CVSS 8.8), using malicious LNK files to bypass security controls and ...
AI in cybersecurity can improve detection and response, but lean teams must weigh complexity, costs, and measurable outcomes ...
After a multi-year competition, the U.S. National Institute of Standards and Technology (NIST) selected a suite of algorithms ...
Trojanized gaming tools and new Windows RATs like Steaelite enable data theft, ransomware, and persistent remote control.
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
Pentagon labels Anthropic a supply chain risk after dispute over mass surveillance and autonomous weapons use.
While the Windows maker did not attribute the activity to a specific threat actor, the use of VS Code tasks and Vercel ...
Research reveals 2,863 public Google API keys can access Gemini endpoints, enabling data exposure and massive billing abuse.