News

Base ransomware decryptor that lets victims recover their files for free, with BleepingComputer confirming that it ...
Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows ...
OpenAI's next foundational and state-of-the-art model, GPT-5, is still on its way after a delay. OpenAI won't tell us the ...
VMware fixed four vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools that were exploited as zero-days during the ...
A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on compromised ...
A critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed "CitrixBleed 2," was actively exploited nearly ...
The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls ...
Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 malware botnet, accusing them of running ...
A critical vulnerability (CVE-2025-20337) in Cisco's Identity Services Engine (ISE) could be exploited to let an ...
The Chinese state-sponsored hacking group known as Salt Typhoon breached and remained undetected in a U.S. Army National ...
To quash speculation of a cyberattack or BGP hijack incident causing the recent 1.1.1.1 Resolver service outage, Cloudflare ...
A threat actor has been deploying a previously unseen malware called OVERSTEP that modifies the boot process of fully-patched ...