Monday cybersecurity recap on evolving threats, trusted tool abuse, stealthy in-memory attacks, and shifting access patterns.
CVE-2026-5760 (CVSS 9.8) exposes SGLang via /v1/rerank endpoint, enabling RCE through malicious GGUF models, risking server ...
Hyperbridge suffers a code exploit. The hacker tricked the protocol into minting one billion of Polkadot's DOT token. They ...
Investors pull $15bn from DeFi. North Korean hackers stole almost $600 million in less than a month. Attacks against DeFi ...
The European Union’s new age verification app, which is designed to protect children online, can be hacked in “two minutes”, ...
Hackers are continuously working on evolving all types of malware to get around protection protocols, keeping them safer from ...
Leaked "DarkSword" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...
A $285 million hack blamed on North Korean state-backed operatives has renewed doubts about the security of a sector that has ...
A massive data breach tied to automotive marketplace CarGurus has exposed approximately 12.4 million user records, with new details pointing to a targeted social engineering attack rather than a ...
The weekly Friday gathering gives students a place to build ambitious personal projects across disciplines, and members say ...