The memory leak security vulnerability allows unauthenticated attackers to extract passwords and tokens from MongoDB servers.
With over 500,000 attendees, PennCyber highlights potential threats. Are your devices secure? Discover how to protect ...
The known RAT aimed at gamers is now targeting security professionals searching GitHub for PoCs and exploit codes.
The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js ...
SafeBreach researchers developed a zero-click PoC exploit that crashes unpatched Windows Servers using the Windows ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for ...
First 2026 cyber recap covering IoT exploits, wallet breaches, malicious extensions, phishing, malware, and early AI abuse.
Browser extensions turned malicious after years of legitimate operation in DarkSpectre campaign affecting millions. The ...
The explosive, easy-to-trigger vulnerability was exploited within hours of disclosure, exposing the risks of default ...
LONDON, Jan. 5, 2026 /PRNewswire/ -- 2025 saw a surge in AI-enabled cyberthreats as adversaries weaponised generative models to produce polymorphic malware, insider-style phishing, and increasingly ...
Example of a PDF attachment with a QR code. Malicious QR codes commonly appear in mass phishing campaigns as well as targeted ...
A recently disclosed vulnerability affecting MongoDB instances has been reportedly exploited in the wild. Exploit code has been released for this flaw dubbed MongoBleed.Key takeaways:MongoBleed is a ...