Ultime news
Huawei Unveils Ascend 384 Super Node for AI at WAIC in Shanghai
After NPM, now it’s PyPI’s turn: Python users, beware of this new phishing campaign.
Linux Kernel 6.16 Released. New Features and Improvements Without Much Woww Effect
Orange reports a serious security incident in France. A record 6,000 cars were put up for sale in the underground.
Earthquake in Kamchatka, tsunami in the Pacific. The situation with undersea cables is under control.
Raven Stealer is here! The malware that steals your data by using Telegram as a “training tool.”
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE
Featured Articles
CybercrimeWhen it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…
CybercrimeAfter a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…
CybercrimeCheck Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…
CybercrimeA recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…
CybercrimeOn January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

