IPOR Labs suffered a $336,000 exploit targeting its USDC Fusion Optimizer vault on Arbitrum, with the attack exploiting a combination of legacy contract vulnerabilities and Ethereum’s newly ...
Threat actors are exploiting CVE-2026-0625, a critical zero-day vulnerability in discontinued D-Link devices for remote code ...
A newly disclosed macOS vulnerability bypasses Apple’s TCC privacy controls, allowing silent access to files, microphone data ...
The flaw allows authenticated n8n users with workflow-creation or modification permissions to bypass the intended security sandbox.
CISA adds two vulnerabilities affecting Microsoft Office and HPE OneView to its KEV list, urging agencies to patch by January ...
Threat actors are exploiting complex routing scenarios and misconfigured spoof protections to send spoofed phishing emails, ...
A maximum severity vulnerability dubbed "Ni8mare" allows remote, unauthenticated attackers to take control over locally ...
Prompt injection lets risky commands slip past guardrails IBM describes its coding agent thus: "Bob is your AI software ...