"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...
Exploit code has been released for an unpatched Windows privilege escalation flaw reported privately to Microsoft, allowing ...
Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell ...
The energy giant is eyeing largely untapped Venezuelan offshore reserves and taking advantage of Trinidad and Tobago ...
A researcher released a working ‘BlueHammer’ Windows zero-day exploit that could impact over 1 billion devices, granting ...
ShowDoc CVE-2025-0520 exploited due to unpatched versions before 2.8.7, enabling remote code execution on 2,000+ instances.
An emerging threat cluster is exploiting vulnerable Web-exposed Next.js apps and using an automated tool to steal credentials ...
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
The Medusa ransomware group is operating at a fast pace by leveraging zero-days and quickly exploiting new bugs and breached ...
A single unauthenticated connection gives attackers a full shell; credential theft observed in under three minutes on honeypot servers.