APT28 exploits SOHO routers for global DNS hijacking and adversary-in-the-middle attacks, enabling credential theft and ...
Docker CVE-2026-34040 enables AuthZ bypass via padded requests, risking host compromise; fixed in version 29.3.1.
CVE-2025-59528 exploited in Flowise for over six months across 12,000+ exposed instances, enabling full system compromise.
Storm-1175 exploits 16+ CVEs since 2023, including zero-days, enabling rapid Medusa ransomware attacks within 24 hours.
Over 1,000 exposed ComfyUI instances exploited via unauthenticated code execution, enabling Monero mining and botnet expansion.
GPUBreach achieves full CPU privilege escalation via GDDR6 RowHammer in July 2025 research, threatening cloud AI systems.
Recurring credential incidents drive operational costs as password resets make up 30% of helpdesk tickets, impacting ...
DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
AI-driven attacks optimize mediocrity in standardized environments, lowering costs to $5 per attack and raising SMB ...
Iran-linked attacks hit 300+ Israeli M365 orgs in March 2026, reviving ransomware campaigns and escalating regional cyber ...
A multi-OS attack can turn one threat into several different investigations at once. The campaign may follow a different path ...
Phishing surge, LinkedIn tracking claims, spyware use, and rising stealers expose growing abuse of trusted systems.