Mozilla Fixed 423 Firefox Security Bugs in April After AI Helped Find Hundreds of Flaws
Mozilla fixed 423 Firefox security bugs across April 2026 releases after using Claude Mythos Preview and other security testing methods to find flaws in the…
Mozilla fixed 423 Firefox security bugs across April 2026 releases after using Claude Mythos Preview and other security testing methods to find flaws in the…
NWHStealer has returned with a more advanced delivery method that uses the Bun JavaScript runtime to infect Windows PCs. Security researchers say attackers are using…
PCPJack is a newly reported cloud-focused malware framework that targets exposed infrastructure, steals credentials, and spreads across additional systems. SentinelOne says the worm targets Docker,…
Microsoft will begin rolling out Entra passkeys on Windows in late April 2026, giving organizations a new phishing-resistant way to sign in to Microsoft Entra-protected…
CrowdStrike has disclosed a critical vulnerability in LogScale that can let a remote attacker read arbitrary files from the server without authentication. The flaw, tracked…
More than 1,370 internet-facing Microsoft SharePoint servers still appeared exposed to CVE-2026-32201 in recent Shadowserver tracking, days after Microsoft released fixes and CISA added the…
Torg Grabber is a newly tracked Malware-as-a-Service infostealer that has evolved quickly from simple Telegram-based data theft into a more mature operation with encrypted command-and-control…
Attackers have started using fake Google Forms as the front end for a malware campaign that delivers the PureHVNC remote access trojan. Security researchers say…
A long-running SEO poisoning campaign has been pushing fake download pages for more than 25 popular apps and tricking Windows users into installing AsyncRAT. Security…
A new social engineering campaign is using fake IT support calls and spam email to gain remote access, steal credentials, and deploy a customized version…
Phishing campaigns now exploit .arpa top-level domain and IPv6 tunnels to evade detection. Infoblox Threat Intel uncovered attackers creating A records in infrastructure-only .arpa namespace…
Cybercriminals bypass browser defenses by abusing Windows File Explorer’s legacy WebDAV support. Attackers deliver RATs through file:// links, .url shortcuts, and LNK files that connect…
Whoer VPN is an online privacy tool designed to help you browse the web securely and anonymously. By masking your IP address and encrypting your…
The Tea app, designed as a women-only dating safety tool, isn’t available in every country due to privacy, moderation, and regional restrictions. It’s a shame…
Virgin TV Go is a streaming service for Virgin Media customers in the United Kingdom. If you’re trying to use it abroad with a VPN…