Attackers target unpatched ShowDoc servers via CVE-2025-0520
Attackers target unpatched ShowDoc servers via CVE-2025-0520 Pierluigi Paganini April 14, 2026 A critical RCE flaw, tracked as CVE-2025-0520, in...
Attackers target unpatched ShowDoc servers via CVE-2025-0520 Pierluigi Paganini April 14, 2026 A critical RCE flaw, tracked as CVE-2025-0520, in...
Image: Generated via Google’s Nano Banana Attackers have been exploiting a zero-day vulnerability in Adobe Acrobat Reader for months, using...
Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution Pierluigi Paganini April 07, 2026 Attackers are exploiting a critical...
Attackers Exploit RCE Flaw as 14,000 F5 BIG-IP APM Instances Remain Exposed Pierluigi Paganini April 06, 2026 Over 14,000 F5...
Solana-based decentralized exchange Drift has confirmed that attackers drained about $285 million from the platform during a security incident that...
For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on to what’s...
Attackers hijack Axios npm account to spread RAT malware Pierluigi Paganini March 31, 2026 Threat actors hijacked the npm account...
Urgent Alert: NetScaler bug CVE-2026-3055 probed by attackers could leak sensitive data Pierluigi Paganini March 29, 2026 Attackers are actively...
Image: User Pascal/Unsplash TP-Link just patched a flaw that let attackers push rogue firmware onto your router without a password....
Cyber attackers increasingly target SMBs because they are often the easiest path into larger supply chains. As cyberattacks are...
Attackers exploit FortiGate devices to access sensitive network information Pierluigi Paganini March 10, 2026 Attackers are exploiting FortiGate devices to...
Attackers move in hours. Most security teams are still running weekly scans. Today we are proud to announce our...
Attackers are abusing OpenClaw’s popularity by seeding fake “installers” on GitHub, boosted by Bing AI search results, to deliver...
TL;DR: We explored a known issue in Google Antigravity where attackers can silently exfiltrate proprietary source code By...
Attackers are abusing normal OAuth error redirects to send users from a legitimate Microsoft or Google login URL to...