Nomani fraudulent investment scheme surged 62% in 2025, leveraging AI-generated deepfakes and social media ads to target users globally. ESET highlights evolving tactics and law enforcement impact.
Small and medium-sized businesses faced increased cyberattacks in 2025, with millions of records exposed. Experts advise stronger authentication, access control, and secure data storage to reduce breach risks in 2026.
Researchers uncover renewed activity from Iranian threat actor Infy, also known as Prince of Persia, revealing updated malware, resilient C2 infrastructure, and expanded global targeting.
QiAnXin XLab reports Kimwolf botnet has compromised 1.8 million Android-based TVs, set-top boxes, and tablets, executing billions of DDoS commands and leveraging ENS infrastructure.
GhostPoster malware used 17 Mozilla Firefox add-ons to execute affiliate link hijacking, ad fraud, tracking injection, and remote code execution, affecting over 50,000 users.
CISA adds CVE-2018-4063 affecting Sierra Wireless AirLink routers to its KEV catalog after reports of active exploitation targeting industrial and OT environments.
Researchers uncover that Urban VPN browser extension silently collected AI chatbot prompts and responses from millions of users across ChatGPT, Claude, Copilot, Gemini, and other platforms.
React2Shell vulnerability continues to face extensive exploitation, with multiple malware families and automated attack activity targeting organizations worldwide.
Huntress reports active exploitation of a newly uncovered Gladinet CentreStack and Triofox vulnerability linked to hard coded cryptographic keys, enabling unauthorized access and remote code execution across affected systems.
Three vulnerabilities in PCIe Integrity and Data Encryption protocol could allow privilege escalation, data corruption, or denial-of-service on Intel Xeon and AMD EPYC processors, CERT/CC advises firmware updates.
Fortinet, Ivanti, and SAP have released security updates to fix critical vulnerabilities in their products, including authentication bypass, code execution, and JavaScript injection flaws, urging organizations to patch promptly.