-
Security
/ 2 weeks agoChina-Linked Hackers Use Zero-Days to Spread Medusa Ransomware
A China-based cyber threat actor has been linked to a series of high-speed attacks that exploit previously unknown software flaws to...
-
Security
/ 2 weeks agoNew GPU Attack Enables Full System Takeover via Memory Flaws
Academic researchers have identified a new class of hardware-based attacks against modern graphics processing units, or GPUs, that could allow an...
-
Security
/ 2 weeks agoRecurring Credential Incidents Pose Persistent Financial Threat
New analysis of data breach costs reveals that while major single incidents command attention, the cumulative financial impact of repeated credential...
-
Security
/ 2 weeks agoIdentity Gaps Persist as AI Threats Loom, Research Finds
A new study has identified a critical security vulnerability within large organizations, where numerous applications operate outside of centralized identity management...
-
Security
/ 2 weeks agoCryptomining Botnet Targets Over 1,000 Exposed ComfyUI Servers
Security researchers have identified an active campaign that has compromised more than 1,000 internet-exposed servers running ComfyUI, a popular graphical interface...
-
Security
/ 2 weeks agoDocker Vulnerability CVE-2026-34040 Bypasses Authorization Plugins
A significant security flaw in Docker Engine has been publicly disclosed, allowing attackers to circumvent critical authorization controls under specific conditions....
-
Security
/ 2 weeks agoNorth Korean Hackers Use GitHub for Attacks on South Korea
cybersecurity researchers have identified a new campaign where threat actors, likely linked to North Korea, are using the public GitHub platform...
-
Security
/ 2 weeks agoIran-Linked Hackers Target Israeli Microsoft 365 Accounts
A cyber campaign linked to Iran has targeted over 300 Israeli organizations using Microsoft 365, according to a cybersecurity firm. The...
-
Security
/ 2 weeks agoBKA Identifies REvil Ransomware Leaders in German Attacks
German authorities have identified two key leaders of the notorious REvil ransomware gang responsible for over 130 attacks in the country....
-
Security
/ 2 weeks agoRansomware Groups Exploit Driver Flaws to Disable Security Software
cybersecurity researchers have identified a sophisticated attack method being used by ransomware operators to neutralize endpoint detection and response (EDR) tools...

