Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation
Google on Monday disclosed that it identified an unknown threat actor using a zero-day exploit that it said was likely...
Google on Monday disclosed that it identified an unknown threat actor using a zero-day exploit that it said was likely...
Ravie LakshmananMay 05, 2026Endpoint Security / Software Security A newly identified supply chain attack targeting DAEMON Tools software has compromised...
When Mozilla shipped Firefox 150 with fixes for 271 issues identified by Anthropic’s Mythos model, the headlines focused on the...
Intro A sophisticated, high-resilience malicious campaign was identified by Atos Threat Research Center (TRC) in March 2026. This operation specifically...
Ravie LakshmananApr 23, 2026Artificial Intelligence / SaaS Security Vercel on Wednesday revealed that it has identified an additional set of...
Ravie LakshmananApr 21, 2026Network Security / Vulnerability Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters...
New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited to escalate...
We’ve identified a huge social-engineering campaign designed to steer people into online gambling sites under the impression they’re installing...
We’ve identified a campaign using business-related lures, such as job interviews, project briefs, and financial document, to distribute malware,...
Sonatype Security Research has identified a potential compromise of a trusted npm maintainer account that has now published two...
In late February 2026, SophosLabs analysts identified multiple detections on Android devices for malicious activity associated with the Keenadu backdoor....
IntroductionIn December 2025, Zscaler ThreatLabz identified a new command-and-control (C2) framework implant that we track as SnappyClient, which was delivered...
Sonatype Security Research has identified two hijacked npm packages in the React Native ecosystem that receive more than 30,000...
Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS...
Executive Summary We identified a security weakness in n8n’s credential management layer that could have completely compromised the application’s...