High-severity flaws in the Chainlit AI framework could allow attackers to steal files, leak API keys & perform SSRF attacks; ...
This was not a single company breach, the credentials were harvested from millions of infected user devices using infostealer malware. Binance appeared in the dataset ...
Pakistan-linked hackers targeted Indian government entities using phishing, Google services, Golang malware, and GitHub-based ...
Internet security watchdog Shadowserver tracks nearly 800,000 IP addresses with Telnet fingerprints amid ongoing attacks ...
Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity ...
North Korean-linked hackers targeted more than 3,100 IP addresses tied to AI, crypto, and finance firms using fake job ...
A spear-phishing campaign tied to the Democratic People's Republic of Korea (DPRK) uses trusted Microsoft infrastructure to ...
Hackers are using AI-generated video calls to impersonate trusted contacts and trick crypto workers into installing malware.
Or at least it will, once I finish the slow process of documenting everything ...