Microsoft Exchange, Windows 11 hacked on second day of Pwn2Own

​During the second day of Pwn2Own Berlin 2026, competitors collected…

Funnel Builder WordPress plugin bug exploited to steal credit cards

A critical vulnerability in the Funnel Builder plugin for WordPress…

Exchange Server zero-day vulnerability can be triggered by opening a malicious email

A newly discovered zero-day vulnerability in Microsoft Exchange Server has…

Expired domain leads to supply chain attack on node-ipc npm package

A popular npm package called node-ipc has been compromised, with…

The Boring Stuff is Dangerous Now

AI agents capable of discovering and exploiting obscure vulnerabilities are…

Critical WatchGuard Vulnerability Lets Unauthenticated Attackers Run Arbitrary Code

 WatchGuard released an advisory detailing a critical vulnerability in its…

Lazarus group targets European drone makers in new espionage campaign

Cybersecurity researchers from ESET have identified a new Lazarus Group…

North Korean APT Hackers Target Ukrainian Government Agencies to Steal Login Credentials

North Korean Advanced Persistent Threat (APT) hackers, specifically the Konni…

Why NHIs Are Security’s Most Dangerous Blind Spot

When we talk about identity in cybersecurity, most people think…

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks

Telecommunications and manufacturing sectors in Central and South Asian countries…

The Boring Stuff is Dangerous Now

AI agents capable of discovering and exploiting obscure vulnerabilities are emerging alongside developers producing vast amounts of potentially flawed AI-generated code, forcing defenders to adapt […]