Apple has warned its massive iPhone user base about a spyware vulnerability that the company itself described as “extremely sophisticated,” prompting emergency patches across multiple product lines.
Learn how CVE-2026-1281 and CVE-2026-1340 enable pre-auth RCE in Ivanti EPMM, now actively exploited, and how AppTrana helps block attacks across applications. The post CVE-2026-1281 & CVE-2026-1340: ...
In the rush to adopt artificial intelligence, the global fintech conversation often fixates on speed: how fast can we scale, how quickly can we credit-score the unbanked, and how rapidly can we deploy ...
A hacking campaign took just days to exploit a newly disclosed security vulnerability in Microsoft Windows version of WinRAR, researchers at Check Point have said. The attackers leveraged ...
A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 vulnerability in WinRAR in espionage attacks on government and law ...
Users could be tricked into running arbitrary code, but the issue was patched last week.
Check Point research found three critical flaws in Anthropic's Claude Code that allow attackers to execute arbitrary commands ...
Ukraine’s Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office. On January 26, ...
By putting conflicting metadata in LNK files, a researcher found four new ways to spoof targets, hide arguments, and run unintended programs in Windows Explorer.
CISA adds four actively exploited vulnerabilities to its KEV catalog, including Chrome RCE, Zimbra SSRF, Windows ActiveX, and ...