radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

620 articles
|
security

Microsoft Patch Tuesday, March 2026 Edition

Microsoft's March 2026 Patch Tuesday: 77 Vulnerabilities Addressed

Krebs on SecurityTHREATS20d
security

New BeatBanker Android malware poses as Starlink app to hijack devices

HIGH

BeatBanker Malware Masquerades as Starlink App to Hijack Android Devices

Bleeping ComputerTHREATS20d
security

New ‘BlackSanta’ EDR killer spotted targeting HR departments

HIGH

BlackSanta EDR Killer Targets HR Departments in New Malware Campaign

Bleeping ComputerTHREATS20d
security

New 'Zombie ZIP' technique lets malware slip past security tools

HIGH

New 'Zombie ZIP' Technique Evades Security Tools

Bleeping ComputerTHREATS20d
security

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

HIGH

FortiGate Firewalls Exploited in Credential Theft Campaign

The Hacker NewsTHREATS20d
security

Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws

HIGH

Microsoft March 2026 Patch Tuesday Addresses 2 Zero-Days and 79 Vulnerabilities

Bleeping ComputerTHREATS20d
security

CRITICAL: Microsoft releases Windows 10 KB5078885 extended security update

CRIT

Microsoft's KB5078885 Update Tackles Critical Windows 10 Vulnerabilities

Bleeping ComputerTHREATS20d
security

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

HIGH

KadNap Malware Hijacks Over 14,000 Asus Routers for Botnet Operations

The Hacker NewsTHREATS20d
security

New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network

HIGH

KadNap Botnet Exploits ASUS Routers for Cybercrime Proxy Network

Bleeping ComputerTHREATS20d
security

Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys

HIGH

Microsoft Enhances Windows Security with Phishing-Resistant Entra Passkeys

Bleeping ComputerTHREATS20d
security

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

HIGH

LeakyLooker Flaws in Google Looker Studio Pose Cross-Tenant SQL Threat

The Hacker NewsTHREATS20d
security

The New Turing Test: How Threats Use Geometry to Prove 'Humanness'

HIGH

Malware Adopts Geometry to Outsmart Sandboxes

Bleeping ComputerTHREATS20d

Showing 217-228 of 620 articles