Monday cybersecurity recap on evolving threats, trusted tool abuse, stealthy in-memory attacks, and shifting access patterns.
CVE-2026-5760 (CVSS 9.8) exposes SGLang via /v1/rerank endpoint, enabling RCE through malicious GGUF models, risking server ...
Hyperbridge suffers a code exploit. The hacker tricked the protocol into minting one billion of Polkadot's DOT token. They ...
The European Union’s new age verification app, which is designed to protect children online, can be hacked in “two minutes”, ...
Investors pull $15bn from DeFi. North Korean hackers stole almost $600 million in less than a month. Attacks against DeFi ...
Hackers are continuously working on evolving all types of malware to get around protection protocols, keeping them safer from ...
Leaked "DarkSword" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions ...
Security researchers have uncovered a series of cyberattacks targeting Apple customers across the world. The tools used in these hacking campaigns have been dubbed Coruna and DarkSword, and they have ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...
Popular tool abuse, ClickFix, and identity-based attacks are among the most prevalent techniques bad actors are deploying ...
A $285 million hack blamed on North Korean state-backed operatives has renewed doubts about the security of a sector that has ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results