A PS4 Star Wars Racer Revenge disc can trigger a PS5 exploit on 12.0 or lower. Prices for Racer Revenge spiked after the ...
First 2026 cyber recap covering IoT exploits, wallet breaches, malicious extensions, phishing, malware, and early AI abuse.
LONDON, Jan. 5, 2026 /PRNewswire/ -- 2025 saw a surge in AI-enabled cyberthreats as adversaries weaponised generative models to produce polymorphic malware, insider-style phishing, and increasingly ...
The memory leak security vulnerability allows unauthenticated attackers to extract passwords and tokens from MongoDB servers.
The development stems from a breakthrough shared by Gezine, a well-known figure in the console security and jailbreak research community, who confirmed that the exploit requires ...
RondoDox botnet exploited React2Shell to compromise IoT devices and Next.js servers over a nine-month global campaign.
The Security Alliance, a non-profit crypto security group known as SEAL, handled more than 1,800 support tickets in 2025, ...
The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js ...
A recently disclosed vulnerability affecting MongoDB instances has been reportedly exploited in the wild. Exploit code has been released for this flaw dubbed MongoBleed.Key takeaways:MongoBleed is a ...
Ubisoft is reeling from a security crisis that goes far beyond simple gameplay exploits. While the community focuses on ...
Example of a PDF attachment with a QR code. Malicious QR codes commonly appear in mass phishing campaigns as well as targeted ...
The $3.9 million Flow exploit on Dec. 27 triggered a controversial rollback proposal that drew a lot of criticism from ...