AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries on February 21, 2026 Posted by The Hacker News
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning on February 21, 2026 Posted by The Hacker News
CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog on February 21, 2026 Posted by The Hacker News
Japanese-Language Phishing Emails, (Sat, Feb 21st) on February 20, 2026 Posted by SANS Internet Storm Center, InfoCON: green
Posted in Hacking news Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs on November 13, 2024 The Hacker News
Posted in Hacking news Iranian Hackers Use “Dream Job” Lures to Deploy SnailResin Malware in Aerospace Attacks on November 13, 2024 The Hacker News
Posted in Hacking news New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration on November 12, 2024 The Hacker News
Posted in Hacking news New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns on November 12, 2024 The Hacker News
Posted in Hacking news North Korean Hackers Target macOS Using Flutter-Embedded Malware on November 12, 2024 The Hacker News
Posted in Hacking news 5 Ways Behavioral Analytics is Revolutionizing Incident Response on November 12, 2024 The Hacker News
Posted in Hacking news New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks on November 11, 2024 The Hacker News
Posted in Hacking news THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 – Nov 10) on November 11, 2024 The Hacker News
Posted in Hacking news New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia on November 11, 2024 The Hacker News
Posted in Hacking news The ROI of Security Investments: How Cybersecurity Leaders Prove It on November 11, 2024 The Hacker News