On January 21, 2026, LastPass warned its users about a new and active phishing campaign aimed at stealing customers' master passwords through fake official communications. According to LastPass's Threat Intelligence,...
Zoom Video Communications has issued an urgent security advisory for a critical vulnerability (identified as CVE-2026-22844 ) affecting its enterprise infrastructure. The issue involves a command injection flaw in Zoom...
Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon...
The UK's National Cyber Security Centre has issued a strong warning regarding a series of denial-of-service (DDoS) attacks targeting British organizations. This phenomenon has not gone unnoticed by authorities, who...
An urgent security update has been released by GitLab for the Community (CE) and Enterprise (EE) editions to address several high-severity vulnerabilities. These vulnerabilities expose installations to potential denial-of-service (DoS)...
A critical security flaw has been discovered in the telnetd server component of GNU InetUtils, involving remote authentication bypass . A security researcher reported the vulnerability on January 19, 2026....
Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald's on their Data Leak Site (DLS) . From the gang's post, the cybercriminals claim to have 861GB of...
A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The...
We had already talked about VoidLink a few days ago , it is a framework composed of over 30 modules that can be combined to meet specific attacker objectives on...
Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of...