Snap Store Domain Hijacking – Poisoned Linux Packages
Attackers are exploiting domain hijacking in the Canonical Snap Store, turning trusted Linux packages into malware delivery mechanisms. This campaign represents a critical escalation in […]
Attackers are exploiting domain hijacking in the Canonical Snap Store, turning trusted Linux packages into malware delivery mechanisms. This campaign represents a critical escalation in […]
Security researchers have identified a new wave of automated intrusions against FortiGate firewall devices, beginning January 15, 2026, with attackers stealing configuration data, creating persistence […]
The ClearFake malware operation has evolved into a highly evasive delivery chain, combining fake CAPTCHA lures with proxy execution techniques that abuse legitimate Windows components […]
Cisco has disclosed a critical zero-day remote code execution (RCE) vulnerability in its Unified Communications (UC) suite, actively exploited in the wild to gain root […]
A massive spam campaign has been observed worldwide, exploiting unsecured Zendesk support systems to flood inboxes with hundreds of bizarre and alarming emails. How the […]
The Pwn2Own Automotive 2026 competition in Tokyo has already made headlines: researchers exploited 37 zero-days on day one, earning $516,500 in rewards while demonstrating critical […]
Microsoft is introducing a new proactive security feature for Teams called the External Domains Anomalies Report, designed to help defenders detect suspicious external communications at […]
Researchers have uncovered a new evolution of the “Contagious Interview” campaign, where North Korean-linked attackers weaponize Visual Studio Code (VS Code) to deliver malicious payloads […]
A critical privilege escalation flaw has been disclosed in the Advanced Custom Fields: Extended (ACF Extended) WordPress plugin, potentially exposing ~50,000 sites to complete compromise. […]
VoidLink represents a major evolution in rootkit design, specifically targeting Linux cloud environments with advanced evasion and adaptability. First identified by Check Point Research (Jan […]
Copyright © 2026 | WordPress Theme by MH Themes