Threat intelligence firm GreyNoise said it recorded 417 exploitation sessions from 8 unique source IP addresses between ...
Ivanti EPMM zero-day flaws enabled cyberattacks on Dutch, EU, and Finnish government systems, exposing employee contact and device data.
Remember the WinRAR path handling exploit we reported on back in August? According to Google, that same flaw, officially dubbed CVE-2025-8088, is still being actively exploited, even though versions ...
Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such as DVWA, OWASP Juice Shop, Hackazon, and bWAPP, to gain access to cloud ...
Infrastructure delivering updates for Notepad++—a widely used text editor for Windows—was compromised for six months by ...
U.S. and Japanese authorities sent a fresh signal that they are prepared to step in to arrest a slide in the yen, prompting the dollar’s biggest one-day percentage drop against the Japanese currency ...
Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability in WinRAR for initial access and to deliver various malicious ...
Java Development Kit (JDK) 26, a planned update to standard Java due March 17, 2026, has reached the initial release candidate (RC) stage. The RC is open for critical bug fixes, with the feature set ...
Tax refund season is here and so are the questions about a fourth stimulus check in 2026 from the IRS and President Donald Trump's $2000 tariff dividend status or eligibility. Here's what to know. In ...
As the IRS moves toward digital-only payments under a Trump-era executive order, taxpayers should expect changes in how refunds are issued and payments are made. Here’s what’s changing. The IRS is ...
A new tool from OpenAI evaluates AI agents’ ability to identify, patch, or exploit smart contract vulnerabilities. Researchers found that agents are better at exploiting vulnerabilities than finding ...