-
Security
/ 1 week agoBackdoored Smart Slider 3 Pro Update Targets WordPress Sites
An unknown threat actor has compromised the update infrastructure for the Smart Slider 3 Pro plugin, distributing a malicious version containing...
-
Security
/ 1 week agoCritical Marimo RCE Flaw Exploited Hours After Disclosure
A critical security vulnerability in the open-source data science platform Marimo was actively exploited within 10 hours of its public disclosure,...
-
Security
/ 1 week agoGoogle Chrome 146 Deploys DBSC to Thwart Session Theft on Windows
Google has released a significant security feature, Device Bound Session Credentials (DBSC), to all Windows users of its Chrome web browser....
-
Security
/ 1 week agoAI Browser Extensions Pose Major Unseen Security Threat
A new cybersecurity report has identified artificial intelligence browser extensions as a significant and largely unmonitored threat vector for organizations. The...
-
Security
/ 1 week agoGlassWorm Campaign Infects Developer IDEs with Zig Dropper
cybersecurity researchers have identified a new phase of the ongoing GlassWorm campaign, which is now using a malicious dropper written in...
-
Security
/ 2 weeks agoEngageLab SDK Flaw Exposed Data of 50 Million Android Users
A significant security vulnerability in a widely used third-party Android software development kit (SDK) has been patched after potentially exposing the...
-
Security
/ 2 weeks agoHack-for-Hire Campaign Targets Journalists in MENA Region
A sophisticated hack-for-hire operation, with suspected links to the Indian government, has targeted journalists, activists, and government officials across the Middle...
-
Security
/ 2 weeks agoAdobe Reader Zero-Day Exploited Since December 2025
Security researchers have confirmed that threat actors have been actively exploiting a previously unknown vulnerability in Adobe Reader since at least...
-
Security
/ 2 weeks agoShadow AI Poses Growing Security Threat to Businesses
Employees across global enterprises are increasingly using artificial intelligence tools without formal approval from their organizations’ IT and security departments. This...
-
Security
/ 2 weeks agoSecurity Bulletin Highlights Botnet, Apache Flaw, 18 Other Threats
A new cybersecurity threat bulletin has detailed a significant hybrid botnet operation, a critical vulnerability in software over a decade old,...

