Sun, 12 Apr 2026
Phishing campaign uses device code authentication flow to compromise organizational accounts. Automated and dynamic attack increases success rate.
Read ArticleSun, 12 Apr 2026
Drift Protocol, a Solana-based DEX, suffered a $280M crypto theft linked to North Korean-backed hackers. The attack involved months of planning and targeted collaboration.
Read ArticleSun, 12 Apr 2026
A critical remote code execution vulnerability in Marimo was exploited within 10 hours of disclosure, risking sensitive data exposure.
Read ArticleSun, 12 Apr 2026
Cloudflare advances its post-quantum security target to 2029 amid new research. AI integration shapes the future design of 6G networks.
Read ArticleSun, 12 Apr 2026
Adobe released emergency patches for a critical Acrobat and Reader zero-day exploited in the wild. The vulnerability allows arbitrary code execution.
Read ArticleSun, 12 Apr 2026
CPUID was compromised for less than 24 hours, serving malicious executables and deploying the STX RAT trojan. The breach exploited a secondary API feature without affecting signed original files.
Read Article