Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware.
0The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation.
0
Browser-based attacks, from AITM phishing and ClickFix to malicious OAuth apps and session hijacking, are driving today's biggest breaches.
A new report from Push Security breaks down the techniques attackers are using, real-world case studies, and the detection gaps leaving security teams exposed.
Launching and managing WordPress sites doesn't have to be complicated or expensive. Hostinger is offering a 1-year Managed WordPress Web Hosting Business Plan, designed to simplify the entire process from launch to growth, for a one-time $19.99 (MSRP $227.88).
0Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.
0Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector.
0Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from affected environments.
0Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the Iranian-linked Handala hacktivist group.
0Family photos have a way of sitting in boxes longer than anyone intends. Negatives, slides, and old film often get stored away, even though they hold some of the most important moments. The Kodak Slide N Scan Film & Slide Scanner is designed to make those memories easier to access and preserve. And it's currently just $189.99.
0Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables attackers to gain Admin access.
0Microsoft is investigating a known issue that prevents some Classic Outlook users from sending emails via Outlook.com.
0Internet security watchdog Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote code execution (RCE) vulnerability.
0A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, and clipboard hijacking capabilities.
0Apple has now made it possible for more iPhones still running iOS 18 to receive security updates that protect against the actively exploited DarkSword exploit kit.
0Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all connected endpoints.
0A new malicious kit called EvilTokens integrates device code phishing capabilities, allowing attackers to hijack Microsoft accounts and provide advanced features for business email compromise attacks.
3A new Android malware dubbed NoVoice exploited known vulnerabilities to gain root access and has been distributed through more than 50 apps on Google Play Store, with at least 2.3 million downloads.
0Using AI regularly often means juggling multiple tools—one for writing, another for research, and maybe a third for images or video. ChatOn AI Assistant takes a more streamlined approach by bringing those capabilities into a single, easy-to-use platform. And a 5-year subscription is currently just a one-time $139.99 (MSRP $199.99).
0Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber's upcoming threat report shows how VPN abuse, RMM tools, and social engineering drive most incidents.
0The U.S. Federal Bureau of Investigation (FBI) warned Americans against using foreign-developed mobile applications, particularly those created by Chinese developers.
4A reliable, flexible device doesn't have to come with a premium price tag—especially when it's designed to adapt to how you actually work. The ASUS Chromebook CM30 (2024) leans into that idea with a 2-in-1 design that easily shifts between laptop and tablet modes, and you can get a refurbished one for just $149.99 (MSRP $369.99).
0