Hackers are actively exploiting a critical vulnerability (CVE-2025-32463) in the sudo package that enables the execution of ...
Prompt injection has been leveraged alongside an expired domain to steal Salesforce data in an attack named ForcedLeak.
Cisco ASA zero-day attacks used RayInitiator bootkit and LINE VIPER malware to breach end-of-support firewalls.
For the last few years, Mac users are facing a wave of fake apps on Microsoft-owned GitHub that disguise themselves as popular software, only to trick victims into handing over their passwords.
The campaign has been codenamed EvilAI by Trend Micro, describing the attackers behind the operation as "highly capable" owing to their ability to blur the line between authentic and deceptive ...
Cofense research sees cybercriminals spoof legal firms with AI tools, spreading malware that steals crypto and may evolve into ransomware.