A stealthy zero-day flaw in Adobe PDF readers left millions open to remote malware attacks. Here’s how the exploit worked, who discovered it, and why updating your software is more important than ever.
As attackers adapt malware to strike Windows, macOS, and Linux simultaneously, security teams face a new wave of cross-platform threats. Learn how unified visibility and modern tools are essential to defend against these evolving risks.
Hackers are exploiting OAuth's error redirection to bypass security and deploy malware, targeting public sector organizations. Microsoft warns that attackers are abusing OAuth standards rather than software bugs, highlighting the need for stricter identity protections.
Attackers are turning OAuth’s trusted login system into a malware delivery channel, targeting government agencies with advanced phishing and sideloading techniques. Microsoft urges immediate action to secure cloud app permissions.
Hackers are manipulating Windows File Explorer and the deprecated WebDAV protocol, using Cloudflare Tunnels to distribute powerful malware via seemingly harmless folders and shortcut files. European businesses face a growing threat as attackers bypass conventional security measures and deliver multiple Remote Access Trojans in a single strike.
Hackers are now abusing popular AI chatbots like Grok and Microsoft Copilot to stealthily control malware, disguising attacks as normal user activity and evading detection. Discover how this technique works and what it means for the future of cyber defense.
A patched but neglected WinRAR flaw is powering a new wave of cyberattacks. From nation-state hackers to petty criminals, attackers are exploiting this vulnerability to plant malware and steal secrets—while an underground market arms even the least-skilled crooks.
A critical WinRAR vulnerability has been weaponized by both state-backed hackers and cybercriminals, enabling global espionage and cybercrime through malicious archive files. Learn how attackers gained persistence and what this means for cybersecurity.
A critical WinRAR vulnerability, CVE-2025-8088, is being exploited by state-backed hackers and cybercriminals to gain persistent access to Windows systems. Despite an available patch, the flaw remains a favorite tool for espionage and financial crime campaigns.
A flaw in Notepad++’s update process enabled attackers to push malware to users, highlighting the critical importance of supply chain security in software.