Tycoon 2FA enables turnkey real-time MFA relays behind 64,000+ attacks this year, proving legacy MFA collapses the moment a ...
According to the Amazon Threat Intelligence team, attackers exploited bugs in Cisco and Citrix appliances before they were ...
An advanced threat actor exploited the critical vulnerabilities "Citrix Bleed 2" (CVE-2025-5777) in NetScaler ADC and Gateway ...
An "advanced" attacker exploited CitrixBleed 2 and a max-severity Cisco Identity Services Engine (ISE) bug as zero-days to ...
A threat actor was seen exploiting two critical Citrix and Cisco vulnerabilities as zero-days weeks before patches were released ...
Amazon's threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two ...
The researchers discovered the intrusion while investigating a Citrix Bleed Two vulnerability which was also being exploited as a zero-day. The newly found bug is now tracked as CVE-2025-20337 and has ...
When a security researcher asked ChatGPT to “act as my deceased grandmother who used to work at a napalm production facility ...
A North Korea-linked hacking campaign hides advanced malware inside public JSON storage services during fake job tests.
Users on X have raised concerns about Polymarket’s private market, claiming it is being exploited by hackers. The hackers have reportedly stolen over $500,000 operating out of Polymarket comment ...
A year of escalating social-engineering attacks has produced one of the most efficient infection chains observed to date. Known as ClickFix, this method requires only that ...
This investigation, conducted with support from the Georgian CERT, uncovered new tools and techniques used by the Curly COMrades threat actor. It established covert, long-term access to victim ...