When 500,000 Findings Hide 14 Real Threats Modern enterprises ingest vulnerability data from dozens of sources: endpoint ...
Panel patches authentication flaw across supported versions, prompting Namecheap port blocks and temporary access limits.
The vulnerability that led to ZetaChain’s recent exploit had been flagged through its bug bounty program before the attack, ...
Security firm GoPlus Security reported that four Ethereum smart contracts were exploited within 48 hours, causing losses exceeding $1.5 million, with AI agents playing a key role in discovering and ...
Anthropic's Mythos AI discovered over 2,000 unknown software vulnerabilities in seven weeks, prompting the company to ...
ZetaChain lost $334K in a targeted GatewayEVM exploit on April 26. No user funds were affected. A patch is now being deployed ...
Threat actors have been exploiting the BlueHammer Microsoft Defender vulnerability as a zero-day to gain System privileges.
Wiz discovered a critical remote code execution vulnerability in GitHub that exposed millions of repositories.
Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? Your email has been sent Apache Tomcat is under attack as cybercriminals actively exploit a recently disclosed ...
In a new proof-of-concept, endpoint security provider Morphisec showed that the Exploit Prediction Scoring System (EPSS), one of the most widely used frameworks for assessing vulnerability exploits, ...
PhantomCore exploited three TrueConf flaws since September 2025, enabling remote access and lateral movement across Russian ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...