fp-4b
-
Read moreCybercriminals abuse n8n AI workflow automation to deliver malware through trusted webhooks, bypassing security filters and targeting enterprise users.
-
Posted: April 15, 2026Views: 24Read moreBooking.com confirms data breach exposing customer booking details. Hackers may use stolen data for phishing and fraud attacks targeting travelers.
-
Read moreAI router flaws allow attackers to inject malicious code, steal credentials, and hijack AI workflows. Learn risks and how to secure AI systems.
-
Read moreHackers allegedly stole 10 petabytes of sensitive data from a Chinese supercomputer, including defense files and missile schematics, now being sold online.
-
Read moreA critical React Server Components flaw (CVE-2026-23869) allows attackers to trigger DoS attacks by exhausting server resources with crafted requests.
-
Read moreNew GPUBreach attack uses RowHammer on GPU memory to gain full CPU access, bypassing protections and posing risks to AI and cloud systems.
-
Read moreInfiniti Stealer is a new macOS malware spreading through fake Cloudflare CAPTCHA pages, tricking users into running malicious commands and stealing sensitive data.
-
Read moreCyber attackers are abusing safe link URL rewriting and multi-layer redirects to bypass email security filters and steal Microsoft 365 credentials through phishing campaigns.
-
Read moreSilver Dragon, a threat group linked to APT41, is targeting government entities using Cobalt Strike, DLL sideloading, DNS tunneling, and Google Drive-based command-and-control techniques.
-
Read moreA sophisticated OneDrive spearphishing campaign targets corporate executives with fake HR emails and Microsoft Office 365 login pages to steal credentials. Learn how to recognize and prevent this threat.