Microsoft Exchange, Windows 11 hacked on second day of Pwn2Own

​During the second day of Pwn2Own Berlin 2026, competitors collected…

Funnel Builder WordPress plugin bug exploited to steal credit cards

A critical vulnerability in the Funnel Builder plugin for WordPress…

Exchange Server zero-day vulnerability can be triggered by opening a malicious email

A newly discovered zero-day vulnerability in Microsoft Exchange Server has…

Expired domain leads to supply chain attack on node-ipc npm package

A popular npm package called node-ipc has been compromised, with…

The Boring Stuff is Dangerous Now

AI agents capable of discovering and exploiting obscure vulnerabilities are…

Lumma Infostealer Developers Persist in Their Malicious Activities

A coordinated operation by Europol, the FBI, Microsoft, and other…

Grandparents to C-Suite: Elder Fraud Reveals Gaps in Human-Centered Cybersecurity

Cybercriminals are weaponizing AI voice cloning and publicly available data…

Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps

Adobe on Tuesday pushed security updates to address a total…

CrushFTP Vulnerability Exploited to Gain Full Server Access

A critical vulnerability (CVE-2025-2825) in CrushFTP, a widely used enterprise…

Microsoft Bookings Vulnerability Allows Unauthorized Changes to Meeting Details

Security researchers have uncovered a significant vulnerability in Microsoft Bookings,…

The Boring Stuff is Dangerous Now

AI agents capable of discovering and exploiting obscure vulnerabilities are emerging alongside developers producing vast amounts of potentially flawed AI-generated code, forcing defenders to adapt […]