The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js ...
Security researchers have discovered a sophisticated malware exploit that poses a significant threat to the security of Google accounts, Independent.co.uk reports. This exploit, which allows ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for ...
The known RAT aimed at gamers is now targeting security professionals searching GitHub for PoCs and exploit codes.
Cybercriminals were quick to integrate a newly released exploit for a Java vulnerability patched in June into a tool used to launch mass attacks against users, an independent malware researcher warned ...
Activision is addressing a self-spreading worm infection in Call of Duty: Modern Warfare 2 by taking its servers down. For almost a month, several players got infected with the malware launched by ...
Cybersecurity firm Kaspersky has detailed more of its findings on the distribution of malware through a zero-day exploit it uncovered in Google Chrome earlier this year. The exploit was executed ...
Security researchers have uncovered a novel cyber-attack campaign targeting vulnerable Docker services. The attacks mark the first documented case of malware utilizing the 9hits application as a ...
In a concerning revelation, multiple information-stealing malware families are exploiting an undocumented Google OAuth endpoint named “MultiLogin” to revive expired authentication cookies, providing ...
Attackers using two recently-uncovered Java unpatched vulnerabilities, or “zero-days,” have quickly expanded their reach by going mainstream, security experts said today. And on Tuesday, Mozilla, ...
Two new attacks exploit a vulnerability in Windows shortcuts -- and security experts expect many more as virus writers pick up on the Stuxnet worm The Windows attack used by a recently discovered worm ...
A new exploit that prompted Adobe to release an emergency patch for Flash Player was used in targeted attacks that distributed malware designed to steal log-in credentials for email and other online ...