Gremlin stealer just leveled up. New variant uses resource file obfuscation, crypto clipping and session hijacking to...
Year: 2026
Hackers now hijacking M365 accounts through Outlook calendar invites. The EvilTokens kit lets attackers steal session tokens...
Microsoft reveals Exchange Server zero-day being actively exploited. Attackers use XSS to execute arbitrary code targeting Outlook...
Day Two of Pwn2Own Berlin 2026: $523K awarded for 24 zero-days on Day One. SharePoint, Exchange, and...
CISA adds Cisco SD-WAN authentication bypass to KEV catalog. Critical flaw CVE-2026-20182 exploited for admin access. Federal...
Canvas LMS hacked: cybercriminals claim they deleted stolen student data. Yeah right. Nobody's buying it except maybe...
Apple's iOS 26.5 introduces default end-to-end encrypted RCS messaging between iPhone and Android devices, closing a long-standing...
Pentagon's top cyber official warns advanced AI represents revolutionary warfare. The future of conflict is here and...
Your phone knows everything. Law enforcement knows that too. Every text, photo, and location ping becomes evidence...
Pentagon cyber official labels advanced AI as revolutionary warfare—a stark warning about how artificial intelligence is fundamentally...