The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js ...
Security researchers have discovered a sophisticated malware exploit that poses a significant threat to the security of Google accounts, Independent.co.uk reports. This exploit, which allows ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for ...
Cybercriminals were quick to integrate a newly released exploit for a Java vulnerability patched in June into a tool used to launch mass attacks against users, an independent malware researcher warned ...
Cybercriminals are exploiting demand for pirated movies by disguising malware as a fake torrent of “One Battle After Another,” a new Leonardo DiCaprio film, tricking Windows users into infecting their ...
The known RAT aimed at gamers is now targeting security professionals searching GitHub for PoCs and exploit codes.
Activision is addressing a self-spreading worm infection in Call of Duty: Modern Warfare 2 by taking its servers down. For almost a month, several players got infected with the malware launched by ...
Two new attacks exploit a vulnerability in Windows shortcuts -- and security experts expect many more as virus writers pick up on the Stuxnet worm The Windows attack used by a recently discovered worm ...
Attackers using two recently-uncovered Java unpatched vulnerabilities, or “zero-days,” have quickly expanded their reach by going mainstream, security experts said today. And on Tuesday, Mozilla, ...
Security researchers have uncovered a novel cyber-attack campaign targeting vulnerable Docker services. The attacks mark the first documented case of malware utilizing the 9hits application as a ...
In a concerning revelation, multiple information-stealing malware families are exploiting an undocumented Google OAuth endpoint named “MultiLogin” to revive expired authentication cookies, providing ...
A new exploit that prompted Adobe to release an emergency patch for Flash Player was used in targeted attacks that distributed malware designed to steal log-in credentials for email and other online ...