Cybercriminals are exploiting Microsoft Teams and remote support tools to impersonate IT staff, gaining access to corporate networks and exfiltrating sensitive data while blending in with normal operations.
UAC-0247 uses fake aid proposals and advanced malware to infiltrate Ukrainian hospitals and governments, stealing browser and WhatsApp data through sophisticated phishing and custom hacking tools.
Ransomware attacks have stabilized at historically high levels into 2026, marking a new baseline for cyber risk. Explore the latest shifts in group activity, attack tactics, and sector vulnerabilities in this investigative report.
A shadowy threat group, UAC-0247, is exploiting humanitarian crises to launch a wave of sophisticated data-theft malware attacks on Ukrainian public sector institutions. Discover how the campaign works, what’s at risk, and how defenders can respond.
Agentic LLM browsers are revolutionizing web automation—but their hidden control planes are turning old web bugs into powerful tools for attackers. Discover how vulnerabilities in AI-driven browsers enable stealthy session hijacking and data theft, and why new safeguards may not be enough.
Progress Software’s OpenEdge platform faces critical security flaws that could let remote attackers access sensitive files and data. Immediate patching is urged to prevent exploitation.
Agentic browsers powered by LLMs bring productivity—and alarming new vulnerabilities. Explore how attackers exploit AI agents for hijack and data theft in the next generation of web browsers.
A massive cluster of Chrome extensions has been exposed for stealing Google and Telegram account data from at least 20,000 users. The extensions, disguised as games and utilities, funneled stolen credentials to a common backend and injected malicious scripts across the web.
AI-powered browser extensions are quietly infiltrating enterprise environments, often escaping detection and carrying significant security risks. Learn how these tools have become a new, dangerous attack vector—and what organizations must do to regain control.
A critical zero-day vulnerability in Adobe Reader is being exploited with malicious PDFs targeting Russian oil and gas sectors. The attack requires no user interaction beyond opening the file, allowing hackers to steal data and potentially launch more severe attacks. No fix is available yet, so users must exercise extreme caution.