x86.se x86.se

Categories

  • Access Control
  • Access Management
  • Ad Fraud
  • AdTech
  • Afghanistan
  • AgentForce
  • Agentic AI
  • Agentic AI control
  • AI
  • AI & ML Security
  • AI adoption metrics
  • AI agents
  • AI Automation
  • AI councils
  • AI firewall
  • AI governance
  • AI identity
  • AI model
  • AI observability and logging
  • AI Safety
  • AI Security
  • AI security frontier
  • AI threat detection
  • AI-driven security
  • AI-native security
  • Airline
  • AitM
  • Akira
  • Altcoin
  • Amatera Stealer
  • Android
  • Anti-Malware Research
  • Antitrust
  • API Security
  • Apple
  • Application Security
  • AppSheet
  • APT
  • APT Groups
  • apt28
  • Archer Health
  • Artificial Intelligence
  • Ascend AI
  • Ascension
  • AsyncRAT
  • ATM Security
  • Attack Surface
  • Authentication
  • Automation
  • AWS
  • Azure
  • backdoor
  • Banking Fraud
  • Beagle red teaming
  • Behavioral analytics UBA
  • Binance
  • Bishop Fox
  • Bitcoin
  • Black Basta
  • Black Hat 2025
  • Blackpoint Cyber
  • Blockchain
  • Botnet
  • Botnets
  • Breach
  • Breach and Attack
  • Breach Simulation
  • BreachForums
  • BRICKSTORM
  • Browser extension security
  • Browser Security
  • Business Continuity
  • C2
  • CA SiteMinder
  • Canada
  • Censorship
  • Centralized policy enforcement
  • ChatGPT
  • Children
  • ChillyHell
  • China
  • CIO and CISO alignment
  • Cisco
  • CISO
  • CISO strategies
  • CISO strategy
  • Cl0p
  • ClaimPix
  • Clop
  • Cloud
  • Cloud Computing
  • Cloud Security
  • CloudFlare
  • CloudSEK
  • Code Security
  • Coding
  • Cofense
  • command-and-control
  • Compliance
  • Compliance and audit readiness
  • Compliance GDPR HIPAA PCI
  • Conditional Access
  • ConnectWise RAT
  • Container Security
  • conti
  • Continuous Monitoring
  • Continuous Threat Exposure Management
  • Copyright
  • Counterfeiters
  • Credential hygiene
  • Credential Theft
  • Critical Infrastructure
  • CRM
  • CrowdStrike Falcon Fund
  • Crypto
  • Cryptocurrency
  • Cryptojacking
  • CVE-2021-43798
  • CVE-2023-21563
  • cve-2023-24932
  • CVE-2024-50623
  • CVE-2024-55956
  • CVE-2024-58260
  • CVE-2025-10035
  • CVE-2025-10547
  • CVE-2025-10725
  • CVE-2025-27915
  • cve-2025-30247
  • cve-2025-4008
  • CVE-2025-41250
  • CVE-2025-41251
  • CVE-2025-41252
  • CVE-2025-43400
  • cve-2025-49844
  • CVE-2025-52906
  • CVE-2025-57714
  • CVE-2025-59489
  • CVE-2025-59934
  • CVE-2025-59951
  • CVE-2025-61882
  • CVE-2025-9230
  • CVE-2025-9231
  • CVE-2025-9232
  • Cyber Attack
  • Cyber Attacks
  • Cyber Crime
  • Cyber Espionage
  • Cyber Resilience
  • Cyber Warfare
  • CyberArk
  • Cybercrime
  • Cybersecurity
  • Cyberwarfare
  • Darwinium
  • Data Breach
  • Data breach prevention
  • Data Exposure
  • Data leak prevention
  • Data Privacy
  • Data Protection
  • Data Security
  • Data Theft
  • Database Security
  • DDoS
  • DDoS attack
  • DDoS Attacks
  • Defend AI
  • DeFi
  • denial-of-service
  • Detour Dog
  • Developer Tools
  • Developers
  • DevOps
  • DevOps Security
  • DevSecOps
  • Digital Crime
  • Discord
  • DNS
  • Documents
  • Dubai
  • Economic Espionage
  • Edge
  • Education
  • EggStreme
  • EggStremeAgent
  • Email Security
  • Empire Podcast
  • Employee AI governance
  • Encryption
  • Endpoint Security
  • Enterprise AI
  • Enterprise IT
  • Enterprise model security
  • Enterprise Security
  • Enterprise Software
  • Ethereum
  • Europol
  • exploit
  • Exploits
  • exposure
  • Exposure Management
  • Extortion
  • Facebook
  • Fake ID
  • Featured
  • File Transfer
  • Fileless
  • FIN11
  • Financial Crime
  • Financial Security
  • Firebox
  • firewall
  • Firmware Security
  • ForcedLeak
  • ForgeCraft
  • ForgeRock
  • Fortra
  • Fraud
  • FraudGPT
  • FTC
  • Gaming
  • GDPR
  • Gemini AI
  • Gemini Trifecta
  • Generative AI
  • Global AI risk mapping
  • GoAnywhere
  • Google
  • Google Cloud
  • Google Workspace
  • Government
  • Great Firewall of China
  • Hacking News
  • Hacks
  • Hacktivism
  • Hardware
  • Hardware Security
  • Healthcare
  • Hiddengh0st
  • HIPAA
  • ics
  • ICS Security
  • ICS/OT
  • identity
  • Identity & Access
  • Identity and Access Management
  • Identity and Access Management (IAM)
  • Identity Management
  • Identity Security
  • Identity theft
  • IIServerCore
  • Incident Response
  • Influencers
  • Info Stealer
  • Infostealer
  • Insider Threats
  • Internet of Things
  • iOS
  • IoT
  • IoT Research
  • IoT Security
  • IT Compliance
  • IT Operations
  • Jaguar Land Rover
  • Jailbreak attack protection
  • Jeremiah Fowler
  • Kernel
  • Kido
  • Kubernetes
  • Lapsus$
  • LastPass Secure Access Experiences
  • Lat61
  • Law Enforcement
  • leak
  • leaked
  • Leaks
  • Legal
  • Linux
  • LLM
  • LLM analysis
  • LLM Security
  • LNER
  • Lone None
  • Lone None Stealer
  • Los Pollos
  • Lua
  • machine learning
  • macOS
  • Magecart
  • Malvertising
  • Malware
  • Malware Analysis
  • Mandiant
  • MATANBUCHUS
  • MatrixPDF
  • MCP Server
  • Medusa
  • Meta
  • MFA
  • Mic-E-Mouse
  • Microsoft
  • Microsoft Entra ID
  • Mid-sized enterprise cybersecurity
  • Military
  • Misconfiguration
  • ML
  • Mobile
  • Mobile Security
  • Muck Stealer
  • Multi-Factor Authentication (MFA)
  • Mustang Panda
  • Nation-state
  • National Security
  • NET-STAR
  • Netherlands
  • Network
  • Network Security
  • Nursery
  • Offensive Security
  • Okta
  • Oleria
  • Online Fraud
  • Online Security
  • Open Source
  • OpenAI
  • Operational Technology
  • OWASP Top 10
  • Owen Flowers
  • Pakistan
  • Palo Alto
  • Passkey support
  • Passport
  • Password Management
  • Password Security
  • Patch Management
  • Patch Tuesday
  • Payment Security
  • PCI-DSS
  • PDF
  • Penetration Testing
  • PhaaS
  • Phantom Taurus
  • Philippine
  • Phishing
  • Phishing Protection
  • Phishing Scam
  • PingFederate
  • PoC
  • Podcast
  • Point Wild
  • Police
  • Popular
  • PowerShell
  • Press Release
  • Privacy
  • Privacy & Compliance
  • privilege escalation
  • Privileged Access Management (PAM)
  • Prompt injection defense
  • proof-of-concept
  • PropellerAds
  • ProSpy
  • PSF
  • Pure Logs Stealer
  • PureMiner
  • PyPI
  • Python
  • QRadar SIEM
  • Qrator Labs
  • Quantum Computing
  • Quantum Resistance
  • Ransom
  • Ransomware
  • Ransomware Defense
  • Raven AI
  • Raven Stealer
  • rce
  • Real-time policy enforcement
  • Recap
  • Redis
  • RediShell
  • Regulatory Compliance
  • RemoteCOM
  • Renault
  • Report
  • Research
  • Resource-constrained businesses
  • Risk Management
  • Russia
  • SaaS
  • SaaS Monitoring
  • SaaS Protect
  • SaaS Security
  • SailPoint
  • Salesforce
  • Samsung
  • SCADA
  • Scam
  • Scam Research
  • Scams and Fraud
  • Scattered Lapsus$ Hunters
  • Scattered Spider
  • SCOUT
  • ScreenConnect
  • Secrets Management
  • Secure Coding
  • Secure passwordless authentication
  • Security
  • Security Automation
  • Security Culture
  • Security Operations
  • Security Training
  • security update
  • Security Validation
  • Senator
  • SentinelOne
  • SEO Poisoning
  • Seraphic Security
  • Server Security
  • Shadow AI detection
  • Shadow AI risks
  • Shadow IT
  • Shadow IT risks
  • Shinobi Security
  • ShinyHunters
  • Shuyal Stealer
  • SIEM and conditional access integration
  • Signal
  • SIM Swapping
  • SimpleHelp RAT
  • Single Sign-On (SSO)
  • SMB
  • SOC Operations
  • Social Engineering
  • Software
  • Software Integrity
  • Software Security
  • Software Supply Chain
  • spam
  • SpamGPT
  • Spotlight
  • Spying
  • Spyware
  • SSO
  • state-sponsored
  • Stealer
  • Straiker
  • StreamYard
  • Strela Stealer
  • Supply Chain
  • Supply Chain Attack
  • Supply Chain Security
  • Surveillance
  • SVG
  • Technology
  • Telegram
  • TFL
  • Thalha Jubair
  • Threat Detection
  • Threat Hunting
  • Threat Intelligence
  • Threat Intelligence,
  • Threat Mitigation
  • Threat Research
  • ThreatLocker
  • ToSpy
  • ToTok
  • TradingView
  • TROJAN
  • Typosquatting
  • UAE
  • UK
  • Ukraine
  • Unauthorized SaaS applications
  • UNC5221
  • Uncategorized
  • United Kingdom
  • United States
  • USA
  • Vane Viper
  • Varun Uppal
  • Venafi
  • Vietnam
  • VoidProxy
  • VPN
  • VPN Security
  • Vulnerabilities
  • Vulnerability
  • Vulnerability Management
  • WatchGuard
  • Web Browser
  • Web Security
  • Web Services
  • Web3
  • Webinar
  • Website Security
  • WestJet
  • WhatsApp
  • Whitepapers
  • Windows
  • Windows Security
  • Winnti
  • Winos
  • WitnessAI Secure AI Enablement Platform
  • Workflow Automation
  • WormGPT
  • Xcape
  • XSS
  • Yadi Zhang
  • YoLink
  • YoLink Smart Hub
  • Zero Day
  • Zero Trust
  • Zero-Day
  • Zeroday
  • Zhimin Qian

x86.se x86.se

x86.se x86.se

What are You Looking For?

  • Vulnerabilities
  • Malware
  • Ransomware
  • Security
  • Malware
  • Threat Intelligence
5 Min Read
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
February 4, 2026

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read
Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
February 4, 2026

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

An innovative approach to discovering, analyzing, and governing identity…
  • Identity Security
  • Security Operations
2 Min Read
Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
February 3, 2026

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

Threat actors have been observed exploiting a critical security flaw…
  • Open Source
  • Vulnerability
4 Min Read
When Cloud Outages Ripple Across the Internet
February 3, 2026

When Cloud Outages Ripple Across the Internet

Recent major cloud service outages have been hard to miss. High-profile…
  • Cloud Computing
  • Zero Trust

Explore Trending Topics

Vulnerabilities
Malware
Ransomware
Security
Windows
Vulnerability
  • Cloud Security
  • Network Security
2 Min Read
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
October 9, 2025

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the…
  • Malware
  • Phishing
2 Min Read
Researchers Warn of Security Gaps in AI Browsers
October 9, 2025

Researchers Warn of Security Gaps in AI Browsers

A new report by security researchers at SquareX Labs has identified several architectural security weaknesses in AI browsers, including…
  • IoT Security
  • Ransomware
4 Min Read
Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025
October 9, 2025

Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025

There has been an increase in the advent of cyberattacks like never before. The companies are adopting cloud computing, AI-driven tech…
  • Microsoft
2 Min Read
Azure outage blocks access to Microsoft 365 services, admin portals
October 9, 2025

Azure outage blocks access to Microsoft 365 services, admin portals

Microsoft is working to resolve an outage affecting its Azure Front Door content delivery network (CDN), which is preventing customers from…
  • Android
  • Malware
  • Mobile Security
  • Phishing
2 Min Read
ClayRat Spyware Campaign Targets Android Users in Russia
October 9, 2025

ClayRat Spyware Campaign Targets Android Users in Russia

A rapidly evolving Android spyware campaign known as “ClayRat” has been discovered targeting Russian users through Telegram…
  • Cybersecurity
  • Hacking News
1 Min Read
ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More
October 9, 2025

ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More

Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation to…
  • Identity Management
  • SaaS Security
5 Min Read
SaaS Breaches Start with Tokens - What Security Teams Must Watch
October 9, 2025

SaaS Breaches Start with Tokens – What Security Teams Must Watch

Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how security teams can strengthen…
  • Security
2 Min Read
Hacktivists target critical infrastructure, hit decoy plant
October 9, 2025

Hacktivists target critical infrastructure, hit decoy plant

A pro-Russian hacktivist group called TwoNet pivoted in less than a year from launching distributed denial-of-service (DDoS) attacks to…
  • Network
2 Min Read
All SonicWall Cloud Backup Users Have Firewall Configuration Files Stolen
October 9, 2025

All SonicWall Cloud Backup Users Have Firewall Configuration Files Stolen

SonicWall has confirmed that an unauthorized actor has accessed firewall configuration backup files for all customers who have used its cloud…
  • Uncategorized
2 Min Read
ICO’s £7.5m Clearview AI Fine a Step Closer After Legal Victory
October 9, 2025

ICO’s £7.5m Clearview AI Fine a Step Closer After Legal Victory

The UK’s data protection watchdog has won its appeal against a controversial facial recognition technology firm, making a £7.5m…
  • Artificial Intelligence
  • Malware
2 Min Read
From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine
October 9, 2025

From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine

Russian hackers' adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025…
  • Uncategorized
2 Min Read
NCSC: Observability and Threat Hunting Must Improve
October 9, 2025

NCSC: Observability and Threat Hunting Must Improve

UK organizations must improve observability and threat hunting “in the vital pursuit of raising the national ability” to detect…
  • Malware
  • Ransomware
  • Vulnerabilities
  • Windows
3 Min Read
High Number of Windows 10 Users Remain as End-of-Life Looms
October 9, 2025

High Number of Windows 10 Users Remain as End-of-Life Looms

A significant proportion individual users and organizations still run the Windows 10 operating system, just days before it reaches its…
  • Vulnerability
  • Website Security
2 Min Read
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme
October 9, 2025

Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme

Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain…
  • Security
3 Min Read
Hackers claim Discord breach exposed data of 5.5 million users
October 9, 2025

Hackers claim Discord breach exposed data of 5.5 million users

Discord says they will not be paying threat actors who claim to have stolen the data of 5.5 million unique users from the company's Zendesk…
  • Security
4 Min Read
New FileFix attack uses cache smuggling to evade security software
October 8, 2025

New FileFix attack uses cache smuggling to evade security software

A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim’s…
  • Security
2 Min Read
Qilin ransomware claims Asahi brewery attack, leaks data
October 8, 2025

Qilin ransomware claims Asahi brewery attack, leaks data

The Qilin ransomware group has claimed the attack on Japanese beer giant Asahi by adding the company to the list of victims on its data leak…
  • Microsoft
2 Min Read
Microsoft 365 outage blocks access to Teams, Exchange Online
October 8, 2025

Microsoft 365 outage blocks access to Teams, Exchange Online

​Microsoft is working to resolve an ongoing outage preventing users from accessing Microsoft 365 services, including Microsoft Teams,…
  • Microsoft
2 Min Read
Microsoft enables Exchange Online auto-archiving by default
October 8, 2025

Microsoft enables Exchange Online auto-archiving by default

Microsoft is enabling threshold-based auto-archiving by default in Exchange Online to prevent email flow issues caused by mailboxes filling up…
  • Cloud
  • Security
2 Min Read
Crimson Collective hackers target AWS cloud instances for data theft
October 8, 2025

Crimson Collective hackers target AWS cloud instances for data theft

The 'Crimson Collective' threat group has been targeting AWS (Amazon Web Services) cloud environments for the past weeks, to steal data…
  • Data Security
  • Malware
4 Min Read
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
October 8, 2025

Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks

Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that…
  • Children
  • Cyber Attack
  • Cyber Crime
  • Cybersecurity
  • Kido
  • Nursery
  • Privacy
  • United Kingdom
2 Min Read
UK Police Arrest Two Teens Over Kido Nursery Ransomware Attack
October 8, 2025

UK Police Arrest Two Teens Over Kido Nursery Ransomware Attack

The UK Metropolitan Police (Met) have arrested two 17-year-old boys in connection with the major ransomware attack that compromised the data…
  • Security
2 Min Read
Hackers exploit auth bypass in Service Finder WordPress theme
October 8, 2025

Hackers exploit auth bypass in Service Finder WordPress theme

Threat actors are actively exploiting a critical vulnerability in the Service Finder WordPress theme that allows them to bypass…
  • Education
  • Security
2 Min Read
London police arrests suspects linked to nursery breach, child doxing
October 8, 2025

London police arrests suspects linked to nursery breach, child doxing

The UK Metropolitan Police has arrested two suspects following an investigation into the doxing of children online after a ransomware attack…
  • DDoS
  • Exploits
  • Vulnerabilities
  • Windows
3 Min Read
Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760)
October 8, 2025

Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760)

July 2025 Windows Updates brought a patch for CVE-2025-49760, a local privilege escalation vulnerability allowing a local unprivileged…
  • Linux
  • Ransomware
  • Vulnerabilities
  • Windows
25 Min Read
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
October 8, 2025

Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing

In April of 2025, my colleague Mat Powell was hunting for vulnerabilities in Autodesk Revit 2025. While fuzzing RFA files, he found the…
  • Malware
  • Threat Intelligence
2 Min Read
Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave
October 8, 2025

Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave

Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it…
  • Data Breach
  • Network
  • Windows
4 Min Read
Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies
October 8, 2025

Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies

The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and…
  • Cloud Security
  • Malware
  • Ransomware
  • Windows
2 Min Read
Nezha Tool Used in New Cyber Campaign Targeting Web Applications
October 8, 2025

Nezha Tool Used in New Cyber Campaign Targeting Web Applications

A newly uncovered cyber campaign featuring the open-source tool Nezha has been observed targeting vulnerable web applications. Beginning in…
  • Apple
  • Exploits
  • Vulnerabilities
2 Min Read
Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code
October 8, 2025

Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code

Google has introduced CodeMender, a new artificial intelligence-powered agent that automatically enhances software security by identifying and…
  • Cloud Security
  • DDoS
  • Phishing
  • Ransomware
3 Min Read
Google Launches Dedicated AI Bug Bounty Program with Rewards Up to $30,000
October 8, 2025

Google Launches Dedicated AI Bug Bounty Program with Rewards Up to $30,000

Google has unveiled a new AI Vulnerability Reward Program (VRP), offering payouts of up to $30,000 for researchers who successfully identify…
  • Cyber Attacks
  • Password Security
1 Min Read
Step Into the Password Graveyard… If You Dare (and Join the Live Session)
October 8, 2025

Step Into the Password Graveyard… If You Dare (and Join the Live Session)

Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don't need…
  • Cybercrime
  • Malware
3 Min Read
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
October 8, 2025

LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem

Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring…
  • Phishing
  • Ransomware
2 Min Read
Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue
October 8, 2025

Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue

A sharp rise in digital fraud is costing companies worldwide an average of 7.7% of annual revenue, according to TransUnion’s H2 2025…
  • Cloud Security
  • Linux
  • Vulnerabilities
  • Windows
2 Min Read
Critical AWS ClientVPN for macOS Vulnerability Let Attackers Escalate Privileges
October 8, 2025

Critical AWS ClientVPN for macOS Vulnerability Let Attackers Escalate Privileges

A critical flaw in the AWS Client VPN for macOS has been disclosed, presenting a local privilege escalation risk to non-administrator…
  • AI
  • Artificial Intelligence
  • ChatGPT
  • Cyber Crime
  • Cybersecurity
  • FraudGPT
  • MatrixPDF
  • OpenAI
  • Security
  • SpamGPT
  • WormGPT
4 Min Read
OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups
October 8, 2025

OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups

OpenAI’s latest “Disrupting Malicious Uses of AI” report shows that hackers and influence operators are moving toward a more…
  • Software Security
  • Vulnerability
3 Min Read
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
October 8, 2025

Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now

Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol…
  • Exploits
  • Vulnerabilities
2 Min Read
PoC Exploit Released for Critical Lua Engine Vulnerabilities
October 8, 2025

PoC Exploit Released for Critical Lua Engine Vulnerabilities

Three newly disclosed vulnerabilities have been identified in the Lua scripting engine of Redis 7.4.5, each presenting severe risks of remote…
  • Ransomware
  • Supply Chain
2 Min Read
Cyber-Attack Contributes to Huge Sales Drop at JLR
October 8, 2025

Cyber-Attack Contributes to Huge Sales Drop at JLR

Jaguar Land Rover (JLR) has revealed a 25% drop in volume sales in the three months up to September 30, largely as a result of the ongoing…
  • Cybersecurity
  • Discord
  • Identity theft
  • Infostealer
  • Malware
  • Point Wild
  • Privacy
  • Security
  • Shuyal Stealer
  • Windows
3 Min Read
New Shuyal Stealer Targets 17 Web Browsers for Login Data and Discord Tokens
October 8, 2025

New Shuyal Stealer Targets 17 Web Browsers for Login Data and Discord Tokens

Cybersecurity researchers at Point Wild’s Lat61 Threat Intelligence Team have found a new infostealer called Shuyal Stealer, a malware…
  • Ransomware
  • Social Engineering
2 Min Read
Bybit Theft Drives Record-Breaking $2bn Haul for North Korea
October 8, 2025

Bybit Theft Drives Record-Breaking $2bn Haul for North Korea

North Korea-backed threat actors have stolen more than $2bn in cryptocurrency this year to fund the hermit state’s missile and nuclear…
  • Ransomware
2 Min Read
Met Police Arrest Two Teens in Connection with Kido Attack
October 8, 2025

Met Police Arrest Two Teens in Connection with Kido Attack

Two teenaged boys have been arrested following a cyber-attack and attempted extortion of a London nursery group, the Metropolitan Police has…
x86.se x86.se