Chinese-speaking threat actors used a compromised SonicWall VPN appliance to deliver a VMware ESXi exploit toolkit that seems to have been developed more than a year before the targeted ...
There’s a well-worn pattern in the development of AI chatbots. Researchers discover a vulnerability and exploit it to do ...
Cisco has patched an ISE vulnerability with public proof-of-concept exploit code that can be abused by attackers with admin ...
OX Security reveals how malicious Chrome extensions exposed AI chats from ChatGPT and DeepSeek, silently siphoning sensitive ...
Crypto hacks stole $2.78B in 2025, with losses peaking early in the year before slowing in Q4, Finbold finds based on ...
A PS4 Star Wars Racer Revenge disc can trigger a PS5 exploit on 12.0 or lower. Prices for Racer Revenge spiked after the ...
The Windows Blue Screen (or Black Screen) of Death is typically a sign that some unrecoverable error or conflict has occurred. Now, cybercriminals are using the dreaded BSOD as a way to trick people ...
Researchers warn of a new WhatsApp “GhostPairing” attack that silently links attacker devices to accounts, enabling message ...
Trust Wallet has confirmed a security breach affecting its browser extension, following reports from several users of ...
Hackers have found a way to quietly take over WhatsApp accounts without touching passwords, SMS codes, or the app’s end-to-end encryption. Instead of breaking crypto, they are abusing a legitimate ...
This week's ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in tactics are stacking up fast, and each one hints at where the ...