The Seiko USA website was defaced over the weekend, displaying a message from attackers claiming they stole its Shopify ...
Compromised Context.ai integration let attackers inherit Vercel employee access and reach internal systems, exposing a ...
Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware ...
From the FBI breach to the DarkSword iPhone exploit, these are the biggest cyber attacks and security failures that have ...
Breach tied to compromised AI tool may have exposed credentials used by app frontends, the user-facing layer that connects ...
Blockchain project Ice Open Network ($ION), the creator behind the $ION token and the Online+ social network built on BNB ...
An attacker has been using maliciously crafted PDF files to exploit a zero-day in Adobe Acrobat and Reader for at least four ...
Cryptopolitan on MSN
KelpDAO’s $300 million exploit appears to be concentrated on Layer 2 routes
KelpDAO’s $300 million exploit now looks more like a Layer 2 failure than a direct break on the Ethereum mainnet, as fears of ...
FIRST CEO Chris Gibson urged global CVE collaboration and integrating AI companies to combat automated cyber threats ...
North Korea's Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials ...
ITWeb on MSN
The breach is in the database
The breach is in the databaseBy Johan Lamberts, Managing Director, Ascent TechnologyIssued by Ascent TechnologyJohannesburg, 17 Apr 2026 The frequency of breaches is rising. (Image source: 123RF) At ...
Under a new model announced by the National Institute of Standards and Technology, NVD will no longer enrich every CVE.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results