The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js ...
Security researchers have discovered a sophisticated malware exploit that poses a significant threat to the security of Google accounts, Independent.co.uk reports. This exploit, which allows ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for ...
Cybercriminals are exploiting demand for pirated movies by disguising malware as a fake torrent of “One Battle After Another,” a new Leonardo DiCaprio film, tricking Windows users into infecting their ...
The known RAT aimed at gamers is now targeting security professionals searching GitHub for PoCs and exploit codes.
Cybercriminals were quick to integrate a newly released exploit for a Java vulnerability patched in June into a tool used to launch mass attacks against users, an independent malware researcher warned ...
Activision is addressing a self-spreading worm infection in Call of Duty: Modern Warfare 2 by taking its servers down. For almost a month, several players got infected with the malware launched by ...
Security researchers have uncovered a novel cyber-attack campaign targeting vulnerable Docker services. The attacks mark the first documented case of malware utilizing the 9hits application as a ...
In a concerning revelation, multiple information-stealing malware families are exploiting an undocumented Google OAuth endpoint named “MultiLogin” to revive expired authentication cookies, providing ...
Attackers using two recently-uncovered Java unpatched vulnerabilities, or “zero-days,” have quickly expanded their reach by going mainstream, security experts said today. And on Tuesday, Mozilla, ...
Two new attacks exploit a vulnerability in Windows shortcuts -- and security experts expect many more as virus writers pick up on the Stuxnet worm The Windows attack used by a recently discovered worm ...
A new exploit that prompted Adobe to release an emergency patch for Flash Player was used in targeted attacks that distributed malware designed to steal log-in credentials for email and other online ...