A previously undocumented state-backed threat actor named GopherWhisper is using a Go-based custom toolkit and legitimate ...
The liquid restaking protocol said the compromised verifier was LayerZero's own infrastructure, and the setup it was faulted ...
The tech company said the model is too powerful to release to the public. Read more at straitstimes.com. Read more at ...
Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuration ...
Email subscription bombing (also known as subscription flooding or email spam bombing) is an attack technique that overwhelms ...
Thailand businesses face over 3,200 cyberattacks each week. That’s 164% higher than the global average. Plus, the country leads Southeast Asia in ransomware, with more than 109,000 cases reported. You ...
The Ruby vulnerability is not easy to exploit, but allows an attacker to read sensitive data, start code, and install ...
Discover how AI accelerates cyberattacks and why firms need to improve their patching strategies to mitigate escalating risks ...
Iranian authorities have been slowly expanding a list of individuals and entities deemed eligible to have limited internet ...
A Grafana AI flaw enables zero-click data exfiltration by hiding malicious prompts in URLs, said a Noma Security report.
Autonomous SOC agents now shipping can rewrite firewall rules and modify IAM policies — outpacing the governance frameworks ...
Facing the biggest hack of 2026, KelpDao—a liquid staking protocol—has now blamed LayerZero [ZRO] as the main culprit behind ...