Active malware exploits DLL side-loading in a signed GitKraken binary to deliver trojans, stealers, and remote access malware ...
A couple of other interesting bugs that Childs points out are these two, CVE-2026-20952 (CVSS 7.7) and CVE-2026-20953 (CVSS 7 ...
Vulnerabilities in popular AI and ML Python libraries used in Hugging Face models with tens of millions of downloads allow ...
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade ...
As large language models (LLMs) evolve into multimodal systems that can handle text, images, voice and code, they’re also becoming powerful orchestrators of external tools and connectors. With this ...
First 2026 cyber recap covering IoT exploits, wallet breaches, malicious extensions, phishing, malware, and early AI abuse.
Losses tied to crypto exploits declined over 60% from November levels, reaching $76 million in December 2025, PeckShield reported Thursday. The largest single incident resulted in a $50 million loss ...
The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js servers with malware and cryptominers. First documented by Fortinet in July ...
Monty Python (or John Cleese, Michael Palin, Terry Jones, Terry Gilliam, Graham Chapman and Eric Idle) brought their brilliant wit and smart humour to theatrical audiences back in 1975 with this nice ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for recently disclosed vulnerabilities. Previously spread through pirated software ...