Recent research reveals critical vulnerabilities in generative AI systems, including jailbreak techniques like Inception attacks, unsafe code...
Offensive Security
Recent reports highlight a surge in MSSQL injection attacks, with threat actors exploiting vulnerabilities to execute remote...
Cybersecurity researchers from Hunt have identified a server hosting advanced malicious tools, including SuperShell command-and-control (C2) payloads...
Defense Secretary Pete Hegseth has terminated the Women, Peace, and Security (WPS) program, labeling it a “woke...
MintsLoader has emerged as a sophisticated malware loader distributing payloads like GhostWeaver, StealC, and a modified BOINC...
The cybersecurity landscape is undergoing a rapid transformation as artificial intelligence reshapes both offensive and defensive capabilities....
Satellite systems are increasingly becoming targets of sophisticated cyberattacks, with nation-states and cybercriminal groups exploiting vulnerabilities in...
Cybercriminals are now compressing attack timelines from reconnaissance to compromise to minutes rather than days, according to...
Pulsegram is a Python-based keylogger integrated with a Telegram bot, designed for capturing keystrokes, clipboard content, and...
In today’s evolving threat landscape, organizations rely on incident response playbooks (IRPs) to mitigate cyberattacks. However, these...
Offensive Security has issued a warning to Kali Linux users regarding potential update failures due to the...
Bug hunting has transformed from a niche activity into a professionalized field where security researchers earn substantial...
SberTech, a Russian software developer under the Sber ecosystem, has expanded its public bug bounty program on...
Amazon has taken a significant step into the satellite internet market with the successful launch of its...
A critical vulnerability (CVE-2025-34491) in GFI MailEssentials enables authenticated attackers to execute arbitrary code through .NET deserialization...
The cybersecurity landscape continues to evolve with increasing automation, as evidenced by a 16.7% year-over-year rise in...
The UK government has announced a landmark ban on SIM farms, becoming the first European country to...
Obfuscation remains a critical tool for attackers aiming to conceal malicious code from defenders. By deliberately complicating...
R-Vision and Open Mobile Platform (OMP) have completed the integration of OMP’s Aurora Center mobile device management...
The latest episode of the SANS Internet Storm Center (ISC) Stormcast, released on April 28, 2025, covers...