fp-1b
-
Read moreLearn about the critical Sangoma FreePBX authentication bypass vulnerability that risks remote code execution and how to protect your system.
-
Read moreDiscover how AI-generated ransomware bypasses antivirus software, posing new cybersecurity risks in 2025 and challenging traditional defenses.
-
Read moreDiscover PromptLock, the first AI-powered ransomware using OpenAI's gpt-oss:20b model, enabling sophisticated attacks across multiple platforms.
-
Read moreExplore how the Underground ransomware gang is enhancing tactics against global organizations, using advanced encryption and targeted attacks.
-
Read moreDiscover how the Salesloft OAuth breach compromised Salesforce customer data through the Drift AI chat agent, affecting over 700 organizations.
-
Read moreDiscover how a malicious Go module masquerading as an SSH brute-force tool exfiltrates credentials to a Telegram bot. Learn about its key features and the threat it poses.
-
Read moreAdversaries are misusing AI-powered website builders like Lovable to create malicious infrastructure for malware distribution and credential phishing. Discover the emerging threats and how organizations can protect themselves.
-
Read moreFrench retailer Auchan has announced a cyberattack that compromised loyalty account information for hundreds of thousands of customers. Learn about the breach, its implications, and the company's response.
-
Read moreA large-scale scanning campaign is targeting Microsoft Remote Desktop Protocol (RDP) services, utilizing over 30,000 unique IP addresses. Learn about the attack's methodology and implications for credential-based attacks.
-
Read moreDiscover critical vulnerabilities in Citrix Session Recording that pose risks to organizations. Learn about improper privilege management and deserialization flaws, along with recommended mitigation actions.