More News
-
Cyber AI
/ 4 months agoCritical Vulnerability in AI-as-a-Service Lets Attackers Access Data
Imagine a marketplace where developers can drop their AI models into a shared sandbox, expecting quick deployment and minimal friction. Replicate.com...
-
Data Breach
/ 4 months ago700 Credit Data Breach Exposes Names, Addresses, SSNs
When a company that sits at the heart of the automotive financing world announces a breach, the ripple effect is immediate...
-
Cyber Attack
/ 4 months agoGoogle Chromium 0-Day Vulnerability Exploited Cyberattacks—CISA Alert
In the quiet hours of a routine audit, Google’s security team uncovered a flaw that could let a malicious actor slip...
-
Vulnerabilities
/ 4 months agoMITRE Reveals 2025’s Top 25 Most Dangerous Software Weaknesses
Each year, the MITRE Corporation curates a list that many in the security community treat as a barometer of risk. The...
-
Data Breach
/ 4 months ago10,000+ Docker Hub Images Leak Credentials from 100+ Companies
In the world of microservices, the container image is the new code repository, and developers treat it as a black box....
-
Cyber AI
/ 4 months agoOllama AI Platform Flaw Lets Hackers Execute Remote Code
Ollama, the open‑source platform that lets developers run large language models on their own hardware, has just become the target of...
-
Cyber Attack
/ 4 months agoCybercriminals Hijack Itch.io & Patreon with Game Updates, Steal Lumma
Itch.io, the beloved playground for indie developers, has recently found itself at the center of a sophisticated social‑engineering scheme. Attackers masquerading...
-
Vulnerabilities
/ 4 months agoCritical Ivanti EPM Vulnerability Admin Session Hijack via Stored XSS
Ivanti Endpoint Manager (EPM) sits at the heart of many enterprises’ remote administration stacks, handling everything from patch deployment to compliance...
-
Data Breach
/ 4 months agoMassive Leak Exposes LockBit 5.0 Servers, IPs, & Domain Names
In the high‑stakes world of cybercrime, a single misstep can expose an entire operation. That is exactly what happened when a...
-
Cyber AI
/ 4 months agoOceanLotus Expands Campaigns into Xinchuang Technology Ecosystems
OceanLotus, the moniker the security community uses for the Vietnamese–linked APT32 group, has quietly shifted gears. Their latest campaign is not...
