Find and remove viral AI notetakers with Nudge Security
Regain control of AI notetakers…and every other AI appFind every AI account.Find…
QNAP fixes seven NAS zero-day flaws exploited at Pwn2Own
QNAP has fixed seven zero-day vulnerabilities that security researchers exploited to hack…
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
A China-linked threat actor has been attributed to a cyber attack targeting…
Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine
Nov 06, 2025Ravie LakshmananMalware / Vulnerability A previously unknown threat activity cluster…
Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data
Nov 05, 2025Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have disclosed a…
Hackers exploit critical auth bypass flaw in JobMonster WordPress theme
Threat actors are targeting a critical vulnerability in the JobMonster WordPress theme…
Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit
Nov 04, 2025Ravie LakshmananArtificial Intelligence / Vulnerability Google's artificial intelligence (AI)-powered cybersecurity…
CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
Oct 31, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure…
China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
Oct 31, 2025Ravie LakshmananEndpoint Security / Cyber Espionage The exploitation of a…


