Microsoft Exchange, Windows 11 hacked on second day of Pwn2Own

​During the second day of Pwn2Own Berlin 2026, competitors collected…

Funnel Builder WordPress plugin bug exploited to steal credit cards

A critical vulnerability in the Funnel Builder plugin for WordPress…

Exchange Server zero-day vulnerability can be triggered by opening a malicious email

A newly discovered zero-day vulnerability in Microsoft Exchange Server has…

Expired domain leads to supply chain attack on node-ipc npm package

A popular npm package called node-ipc has been compromised, with…

The Boring Stuff is Dangerous Now

AI agents capable of discovering and exploiting obscure vulnerabilities are…

3 Ways Security Teams Can Minimize Agentic AI Chaos

Security often lags behind innovation. The path forward requires striking…

SafePay Claims Ingram Micro Breach, Sets Ransom Deadline

The ransomware gang claims to have stolen 3.5TB of data,…

SecurityMetrics Wins “Data Leak Detection Solution of the Year” in 2025 CyberSecurity Breakthrough Awards Program

Orem, United States, November 18th, 2025, CyberNewsWire SecurityMetrics, a leading…

‘Curly COMrades’ APT Hackers Target Critical Organizations Across Multiple Countries

Bitdefender Labs has identified a sophisticated advanced persistent threat (APT)…

The books shaping today’s cybersecurity leaders

From strategy and psychology to history and decision-making, these are…

The Boring Stuff is Dangerous Now

AI agents capable of discovering and exploiting obscure vulnerabilities are emerging alongside developers producing vast amounts of potentially flawed AI-generated code, forcing defenders to adapt […]