Microsoft Exchange, Windows 11 hacked on second day of Pwn2Own

​During the second day of Pwn2Own Berlin 2026, competitors collected…

Funnel Builder WordPress plugin bug exploited to steal credit cards

A critical vulnerability in the Funnel Builder plugin for WordPress…

Exchange Server zero-day vulnerability can be triggered by opening a malicious email

A newly discovered zero-day vulnerability in Microsoft Exchange Server has…

Expired domain leads to supply chain attack on node-ipc npm package

A popular npm package called node-ipc has been compromised, with…

The Boring Stuff is Dangerous Now

AI agents capable of discovering and exploiting obscure vulnerabilities are…

Agentic AI opens door to new ID challenges: Report

New research released Thursday by Rubrik Zero Labs finds that…

‘CoGUI’ Phishing Kit Helps Chinese Hackers Target Japan

Japan is being peppered with an overwhelming volume of spam,…

Mirai Botnet Actively Targeting GeoVision IoT Devices for Command Injection Exploits

The Akamai Security Intelligence and Response Team (SIRT) has identified…

WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors

Cybersecurity researchers are warning about a large-scale phishing campaign targeting…

Hackers Exploit SendGrid to Steal User Login Credentials in Latest Attack

Cybersecurity researchers at the Cofense Phishing Defense Center (PDC) have…

The Boring Stuff is Dangerous Now

AI agents capable of discovering and exploiting obscure vulnerabilities are emerging alongside developers producing vast amounts of potentially flawed AI-generated code, forcing defenders to adapt […]