Critical ExifTool flaw lets malicious images run code on macOS
A newly disclosed ExifTool vulnerability can let a malicious image trigger command execution on macOS during metadata processing. The flaw affects ExifTool 13.49 and earlier…
A newly disclosed ExifTool vulnerability can let a malicious image trigger command execution on macOS during metadata processing. The flaw affects ExifTool 13.49 and earlier…
A critical vulnerability affecting multiple Hikvision surveillance products is drawing fresh security attention after it was added to the U.S. government’s Known Exploited Vulnerabilities (KEV)…
Microsoft has warned that malicious AI-themed browser extensions compromised enterprise users and exposed sensitive chat histories across more than 20,000 organizational tenants. The fake extensions,…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that several Apple vulnerabilities affecting macOS, iOS, iPadOS, Safari, and other Apple platforms are actively…
A newly detailed cyber campaign has targeted high-value organizations across South, Southeast, and East Asia by exploiting internet-facing web servers, planting web shells, stealing credentials,…
Banks in the EU should immediately refund customers for unauthorized transactions, even when the bank believes the customer acted with gross negligence, according to an…
A fast-growing open-source project called π RuView says it can turn WiFi signal data into human pose estimation, presence detection, and even breathing or heart-rate…
A dark web post is claiming to sell an exploit for CVE-2026-21533, a Windows Remote Desktop Services elevation-of-privilege flaw that Microsoft disclosed and patched on…
A newly documented intrusion chain links the ClickFix social-engineering technique to activity associated with Velvet Tempest, a long-running ransomware affiliate that Microsoft previously mapped from…
Microsoft says threat actors now use artificial intelligence throughout the cyberattack lifecycle, from early reconnaissance and phishing to malware development, post-compromise research, and data monetization.…