General cybersecurity industry news, market trends, and analysis
Specially crafted domains could be used to cause out-of-memory conditions, leading to memory leaks in the BIND resolvers.
Claude extension flaw enabled silent prompt injection via XSS and weak allowlist, risking data theft and impersonation until Feb 19, 2026 fix.
The state-sponsored threat actor deployed kernel implants and passive backdoors enabling long-term, high-level espionage.
The high- and medium-severity flaws could lead to denial-of-service, secure boot bypass, information disclosure, and privilege escalation.
Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a study finds.
81% of attacks are malware-free as AI-driven mimicry hides threats in trusted systems, increasing detection difficulty and risk.
ThreatsDay Bulletin covers stealthy attack trends, evolving phishing tactics, supply chain risks, and how familiar tools are being quietly abused.
A disgruntled data analyst decides that the best response to losing his contract is to steal the entire company payroll database and demand $2.5…
Coruna reuses Triangulation kernel exploits targeting iOS 13–17.2.1 devices, expanding attacks into mass exploitation campaigns.
Validate your security posture with real attacker behavior using continuous, CTI-driven testing to uncover gaps and prove defenses work.
World Leaks is a cyber extortion operation that steals sensitive data from organizations and threatens to leak it via the dark web if a ransom is not paid. Read more in my article on the Fortra blog.
Hambardzum Minasyan of Armenia has been accused of being involved in the development and administration of the infostealer malware.