Adobe Acrobat and Reader users are under attack from hackers using a zero-day vulnerability. Update within 72 hours, Adobe ...
Rowhammer attacks have been around since 2014, and mitigations are in place in most modern systems, but the team at gddr6.fail has found ways to apply the attack to current-generation GPUs.
Microsoft warns users that multi-stage malware exploits trusted messaging apps to steal information and run hidden system ...
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
A Windows utility tool was found vulnerable to a critical flaw that enabled RCE, DoS, and other risks.
AI-powered fileless malware is changing what it means to keep a Windows 11 PC secure. Here's what's happening and what to do.
TeamPCP hackers compromised the Telnyx package on the Python Package Index today, uploading malicious versions that deliver credential-stealing malware hidden inside a WAV file. Earlier today, the ...
The GlassWorm malware campaign is being used to fuel an ongoing attack that leverages the stolen GitHub tokens to inject malware into hundreds of Python repositories. "The attack targets Python ...
Threat actors are exploiting a common developer habit — copying installation commands directly from websites — to distribute malware through fake software installation pages. Security researchers at ...
Multiple vulnerabilities in Anthropic's Claude Code could enable attackers to run harmful commands and steal API keys by hiding malicious files in a code repository, Check Point researchers found.
A malicious NuGet package designed to mimic Stripe's official .NET library has been uncovered by cybersecurity researchers, marking a shift in tactics from earlier cryptocurrency-focused campaigns to ...