radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

689 articles
|
security

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

HIGH

Silver Dragon APT41 Group Exploits Cobalt Strike and Google Drive for Cyber Attacks

The Hacker NewsTHREATS27d
security

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

HIGH

CISA Flags Actively Exploited VMware Aria Operations Vulnerability

The Hacker NewsTHREATS27d
security

Paint maker giant AkzoNobel confirms cyberattack on U.S. site

HIGH

AkzoNobel Confirms Cyberattack on U.S. Operations

Bleeping ComputerTHREATS27d
security

CRITICAL: CISA flags VMware Aria Operations RCE flaw as exploited in attacks

CRIT

CISA Alerts on Exploited VMware Aria Operations RCE Vulnerability

Bleeping ComputerTHREATS27d
security

Signed malware impersonating workplace apps deploys RMM backdoors

HIGH

Signed Malware Uses Stolen EV Certificate to Deploy RMM Backdoors

Microsoft Security BlogM36527d
security

Facebook accounts unavailable in worldwide outage

Global Facebook Outage Leaves Users Locked Out of Accounts

Bleeping ComputerTHREATS27d
security

Microsoft: Hackers abuse OAuth error flows to spread malware

HIGH

Hackers Exploit OAuth Error Flows to Spread Malware, Microsoft Warns

Bleeping ComputerTHREATS27d
security

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

HIGH

Fake IT Support Scam Deploys Havoc C2 Framework for Cyber Attacks

The Hacker NewsTHREATS28d
security

Google Chrome shifts to two-week release cycle for increased stability

Google Chrome Accelerates Release Cycle for Enhanced Stability

Bleeping ComputerTHREATS28d
security

Compromised Site Management Panels are a Hot Item in Cybercrime Markets

HIGH

Underground Markets Thrive on Compromised cPanel Credentials

Bleeping ComputerTHREATS28d
security

LexisNexis confirms data breach as hackers leak stolen files

HIGH

LexisNexis Data Breach Exposes Customer Information

Bleeping ComputerTHREATS28d
security

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

HIGH

AI-Driven Attacks Exploit FortiGate Appliances in 55 Countries

The Hacker NewsTHREATS28d

Showing 337-348 of 689 articles