The Kimwolf botnet has grown to over 2 million Android devices, largely exploiting residential proxy networks, according to cybersecurity firm Synthient. Active since at least August...
A software supply chain attack involving the self-replicating Shai-Hulud 2.0 worm has been linked to a $8.5 million theft from cryptocurrency wallet Trust Wallet, the company...
A high-severity vulnerability affecting multiple versions of MongoDB is actively being exploited by threat actors worldwide. Dubbed MongoBleed (CVE-2025-14847), the flaw allows unauthenticated attackers to leak...
Dec. 29, 2025 — A critical security flaw in MongoDB, identified as CVE-2025-14847 and nicknamed MongoBleed, is being actively exploited across the globe, with over 87,000...
The final weeks of 2025 highlighted a cybersecurity landscape defined not by a single headline incident, but by multiple simultaneous threats exploiting both new and longstanding...
As 2025 draws to a close, cybersecurity teams worldwide are racing to contain MongoBleed (CVE-2025-14847), a high-severity vulnerability affecting multiple versions of the widely used open-source...
Cybersecurity is entering an era where the line between everyday technology and malicious activity is increasingly blurred. Threat actors are no longer just infiltrating systems—they are...
A data breach that hit password manager LastPass in 2022 is still generating financial fallout, with millions of dollars in cryptocurrency stolen as recently as late...
Fortinet has issued a warning regarding the active exploitation of a five-year-old vulnerability in FortiOS SSL VPN, which can allow attackers to bypass two-factor authentication (2FA)...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw affecting Digiever DS-2105 Pro network video recorders (NVRs) to its Known Exploited...