Chinese hackers allegedly broke into the network of an Ivanti subsidiary in 2021. The hackers exploited a backdoor in its VPN product, which allowed the hackers to gain access to 119 other unnamed ...
Critical security flaws targeting Windows and Office users allow hackers to take complete control of a victim's computer by ...
The US cybersecurity agency CISA on Friday warned of two RoundCube Webmail vulnerabilities being exploited in the wild. Prevalent within government and enterprise networks, RoundCube Webmail is a ...
Oracle has fixed a zero-day vulnerability in one of its flagship business software products that a hacking group is currently abusing to steal personal information about corporate executives. In a ...
A private key compromise drained millions from IoTeX’s ioTube bridge, with analysts disputing total losses and warning recovery via THORChain may prove difficult.
A suspected Chinese state-backed hacking group has been quietly exploiting a critical Dell security flaw in zero-day attacks ...
Threat actors are weaponizing a zero-day vulnerability in Dell RecoverPoint for Virtual Machines in a cyberattack campaign ...
A vulnerability affecting the ThreatSonar Anti-Ransomware product of Taiwan-based cybersecurity firm TeamT5 has been ...
Threat actors have been exploiting a zero-day vulnerability in legacy Sitecore deployments to deploy WeepSteel reconnaissance malware. The flaw, tracked under CVE-2025-53690, is a ViewState ...
Hackers accelerated the laundering of funds in the second half of 2025, using DeFi protocols and Web3 infrastructure to fragment and disguise their haul. Highly liquid protocols were attacked the most ...
Cybersecurity researchers recently tested a popular infusion pump and dock and found that the device has certain vulnerabilities that could allow hackers to exploit its medication dosing functions, ...