Microsoft’s MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday on May 13, 2026 Posted by The Hacker News
Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation on May 13, 2026 Posted by The Hacker News
[Webinar] Why Your AppSec Tools Miss the “Lethal Path” (and How to Fix It) on May 13, 2026 Posted by The Hacker News
Posted in Hacking news Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution on January 28, 2026 The Hacker News
Posted in Hacking news Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks on January 28, 2026 The Hacker News
Posted in Hacking news Password Reuse in Disguise: An Often-Missed Risky Workaround on January 28, 2026 The Hacker News
Posted in ESET research Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan on January 28, 2026 WeLiveSecurity
Posted in Hacking news Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 on January 28, 2026 The Hacker News
Posted in Hacking news Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan on January 28, 2026 The Hacker News
Posted in browser Beware! Fake ChatGPT browser extensions are stealing your login credentials on January 28, 2026 Graham Cluley
Posted in Hacking news Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected on January 27, 2026 The Hacker News
ISC Stormcast For Wednesday, January 28th, 2026 https://isc.sans.edu/podcastdetail/9784, (Wed, Jan 28th) on January 27, 2026 SANS Internet Storm Center, InfoCON: green
Eeny, meeny, miny, moe? How ransomware operators choose victims on January 27, 2026 Category: Threat Research