Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
The bugs could lead to authentication bypass, remote code execution, information disclosure, and privilege escalation.
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
View CSAF
In January 2026, a threat actor hacked the hospital’s internal network and stole personal and health information.
REF1695 spreads RATs and miners since Nov 2023 via ISO lures, earning 27.88 XMR across four wallets through cryptomining and CPA fraud.
AI-driven development increased CVEs by 145% from Dec 2025–Feb 2026, accelerating remediation and reshaping software supply chain security.
Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables attackers to gain Admin access.
The AI recruiting firm is investigating the incident as Lapsus$ claimed the theft of 4TB of Mercor data.
The malware can spy on victims, steal their information, and make configuration changes on devices.
WhatsApp alerted 200 users in Italy to spyware iOS app, highlighting Europe’s expanding surveillance crisis.