Research reveals 2,863 public Google API keys can access Gemini endpoints, enabling data exposure and massive billing abuse.
Pentagon labels Anthropic a supply chain risk after dispute over mass surveillance and autonomous weapons use.
The U.S. DoJ seized $61 million in Tether tied to pig butchering crypto investment scams, while Tether reports freezing $4.2 ...
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
Researchers detail Aeternum C2 storing botnet commands on Polygon blockchain, while DSLRoot operates 300 residential proxy ...
A fake Go module posing as golang.org/x/crypto captures terminal passwords, installs SSH persistence, and delivers the ...
While the Windows maker did not attribute the activity to a specific threat actor, the use of VS Code tasks and Vercel ...
Over 900 FreePBX systems remain infected after CVE-2025-64328 exploitation, now listed in CISA KEV amid active attacks.
CISA added FileZen CVE-2026-25108 (CVSS 8.7) to its KEV catalog after active exploitation, affecting versions 4.2.1–4.2.8 and ...
Trojanized gaming tools and new Windows RATs like Steaelite enable data theft, ransomware, and persistent remote control.
The campaigns detailed by AI upstart entail the use of fraudulent accounts and commercial proxy services to access Claude at ...
Researchers uncover wormable XMRig campaign using BYOVD exploit and LLM-built React2Shell attacks hitting 90+ hosts.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results