News
Multiple Fortinet FortiWeb instances recently infected with web shells are believed to have been compromised using public ...
Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious ...
Google’s Big Sleep AI agentic system spotted a zero-day SQLite bug after threat signals emerged, preventing hackers from ...
A vulnerability affecting systems named End-of-Train and Head-of-Train can be exploited by hackers to cause trains to brake.
REverse Tactics has been credited by Broadcom for two CVEs: CVE-2025-41237, a critical out-of-bounds write vulnerability that can be exploited by a privileged attacker on a VM to execute arbitrary ...
Arcadia Finance has been hit by a $2.5 million exploit targeting its Rebalancer contract on Base. The attacker swapped stolen USDC and USDS for Wrapped Ethereum.
The hacker who stole $40 million from the GMX v1 exchange has begun returning funds after accepting a $5 million white hat ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results