Microsoft's Patch Tuesday reports 6 flaws already under fireMicrosoft's Patch Tuesday reveals a significant number of critical vulnerabilities, with some already being actively exploited.
Back to the future: Windows Update is now a trojan horse for hackersA vulnerability in Windows Update can make fully patched machines vulnerable to past exploits.
Russian government hackers found using exploits made by spyware companies NSO and Intellexa | TechCrunchRussian hackers are using exploits linked to spyware firms, indicating threats from powerful cyber tools can trickle down to dangerous actors.
Cloudflare reports almost 7% of internet traffic is malicious6.8% of internet traffic is malicious, driven by wars, elections, and new vulnerabilities.Speed at which new vulnerabilities are exploited is alarming, attackers targeting old vulnerabilities first.DDoS attacks are cybercriminals' preferred weapon, with increasing sophistication and volume.
Commercial spyware vendor exploits used by Kremlin-backed hackers, Google saysCommercial surveillance vendors' exploits pose a global risk as they can be exploited by malicious actors despite initial claims of lawful use.
Three-year-old Apache Flink flaw now under active attackApache Flink CVE-2020-17519 allows unauthorized reading of local files, exploited in the wild, prompting urgent patches and checks for compromises.
Microsoft's Patch Tuesday reports 6 flaws already under fireMicrosoft's Patch Tuesday reveals a significant number of critical vulnerabilities, with some already being actively exploited.
Back to the future: Windows Update is now a trojan horse for hackersA vulnerability in Windows Update can make fully patched machines vulnerable to past exploits.
Russian government hackers found using exploits made by spyware companies NSO and Intellexa | TechCrunchRussian hackers are using exploits linked to spyware firms, indicating threats from powerful cyber tools can trickle down to dangerous actors.
Cloudflare reports almost 7% of internet traffic is malicious6.8% of internet traffic is malicious, driven by wars, elections, and new vulnerabilities.Speed at which new vulnerabilities are exploited is alarming, attackers targeting old vulnerabilities first.DDoS attacks are cybercriminals' preferred weapon, with increasing sophistication and volume.
Commercial spyware vendor exploits used by Kremlin-backed hackers, Google saysCommercial surveillance vendors' exploits pose a global risk as they can be exploited by malicious actors despite initial claims of lawful use.
Three-year-old Apache Flink flaw now under active attackApache Flink CVE-2020-17519 allows unauthorized reading of local files, exploited in the wild, prompting urgent patches and checks for compromises.
Zero Day Initiative - Pwn2Own Automotive 2025 - Day Three and Final ResultsPwn2Own Automotive 2025 awarded $718,250 for security exploits over three days.Sina Kheirkhah leads in points despite ongoing competition.Synacktiv team showcased integer overflow exploit for additional prize.
There's Something Very Sketchy About Elon Musk's Diablo IV BuildElon Musk's Diablo IV dungeon achievement is potentially marred by a recent game exploit that could invalidate his performance.
CoD: Black Ops 6 Player Hit Prestige Level 1,000 Using Zombies Exploit, Rewards RevealedThe Grind to level 1,000 in Black Ops 6 was accelerated through exploits, revealing final Prestige rewards and sparking discussions on their value.
There's Something Very Sketchy About Elon Musk's Diablo IV BuildElon Musk's Diablo IV dungeon achievement is potentially marred by a recent game exploit that could invalidate his performance.
CoD: Black Ops 6 Player Hit Prestige Level 1,000 Using Zombies Exploit, Rewards RevealedThe Grind to level 1,000 in Black Ops 6 was accelerated through exploits, revealing final Prestige rewards and sparking discussions on their value.
New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and ProxyjackingLinux servers are targeted by stealthy malware perfctl, primarily for cryptocurrency mining and proxyjacking.
Threat actors exploited Windows 0-day for more than a year before Microsoft fixed itThreat actors exploited Windows zero-day vulnerability for over a year before Microsoft patched it.
New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and ProxyjackingLinux servers are targeted by stealthy malware perfctl, primarily for cryptocurrency mining and proxyjacking.
Threat actors exploited Windows 0-day for more than a year before Microsoft fixed itThreat actors exploited Windows zero-day vulnerability for over a year before Microsoft patched it.
Microsoft fixes exploited bugs, one used in QakBot attacksMicrosoft disclosed and patched 60 Windows CVEs, including two widely exploited ones: CVE-2024-30051 and CVE-2024-30040 with significant CVSS ratings.
Google patches its fifth zero-day vulnerability of the year in ChromeGoogle has patched a high-severity zero-day vulnerability in Chrome, marking the fifth update this year to protect against malicious exploits.
CISA expects devs to squash old directory traversal bugsCISA urges software industry to address directory traversal vulnerabilities.
AI's use as a hacking tool has been overhypedThe study found that GPT-4 was the only model able to write viable exploits for a range of vulnerabilities.