WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence A newly discovered campaign has compromised tens of thousands of outdated or end-of-life...
Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence A newly discovered campaign has compromised tens of thousands of outdated or end-of-life...
TL;DR We discovered a vulnerability in a popular MCP server hosting service that compromised thousands of AI servers and...
Adversaries exploit compromised identities, infrastructure weaknesses, and misconfigurations to gain unauthorized access to sensitive data and systems, putting user-based access...
The world’s largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices...
A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported...
An ongoing supply chain attack dubbed "Shai-Hulud" has compromised hundreds of packages in the npm repository with a self-replicating worm...
Billions (No, that’s not a typo, Billions with a capital B) of files were potentially compromised. If you thought Node...
Sep 09, 2025Ravie LakshmananCryptocurrency / Software Security Multiple npm packages have been compromised as part of a software supply chain...
This is how you handle cybercrime digital extortion! Coinbase was compromised by trusted 3rd party partners, which exposed customer data — but...
The frequently utilized xrpl.js Ripple digital currency library was compromised during a supply chain breach Pierluigi Paganini April 23, 2025...
Through the utilization of stolen login details from customer management platforms and large-scale email services, a nefarious initiative named PoisonSeed...
Identity-driven assaults are increasing. Intruders are aiming at identities with breached credentials, stolen authentication techniques, and abused authorities. Despite numerous...
A cyberattack linked to China compromised the U.S. Treasury Department, exploiting a vulnerability in the third-party cybersecurity provider BeyondTrust to...
One journalist from Serbia experienced the initial unlocking of his mobile device using a Cellebrite device, followed by infiltration of...
Hackers are aware that privileged accounts hold considerable power. A single breached account can result in data theft, operational disruptions,...