A ransomware gang exploited the critical React2Shell vulnerability (CVE-2025-55182) to gain initial access to corporate ...
ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage ...
A custom loader initiated the vulnerable driver, located targeted endpoint detection services then issued kernel-level ...
Cybercriminals have circulated a fraudulent torrent claiming to contain “One Battle After Another”, a film released on ...
Attackers are exploiting a Flight protocol validation failure that allows them to execute arbitrary code without ...
Cybercriminals are exploiting demand for pirated movies by disguising malware as a fake torrent of “One Battle After Another, ...
Researcher warns that many .NET applications might be vulnerable to arbitrary file writes because .NET’s HTTP client proxy ...
After noticing a spike in detections involving what looked like a movie torrent for One Battle After Another, Bitdefender researchers started an investigation and discovered that it was a complex ...
Discover the 10 best Infrastructure as Code (IaC) tools for DevOps teams in 2025. Learn how these tools enhance automation, stability, and scalability in cloud environments. Improve your deployment ...
Researchers uncover malware campaigns using cracked software and compromised YouTube videos to deliver CountLoader, GachiLoader, and info stealers.
Microsoft fixed 56 Windows security flaws, including an actively exploited privilege-escalation bug and two new ...