The open-source network monitor Sniffnet now assigns traffic to individual programs. Version 1.5.0 also brings blacklists and ...
IntroductionOn March 12, 2026, Zscaler ThreatLabz discovered a malicious ZIP archive containing military-themed document lures targeting Chinese-speaking individuals. Our analysis of this sample ...
Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context Protocol's (MCP) architecture ...
Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuration ...
CVE-2026-33032 exposes nginx-ui to unauthenticated takeover via MCP endpoint, impacting 2,600+ instances with active ...
In January I finally made good on my threat/promise to install Linux on my desktop. I wanted to see how far I could get using ...
A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability ...
Gartner issued a same-day advisory after Anthropic leaked Claude Code's full architecture. CrowdStrike CTO Elia Zaitsev and Enkrypt AI CSO Merritt Baer weigh in on agent permissions and derived IP ...
A researcher analyzed internet-facing Perforce P4 servers and found that many are still misconfigured, exposing highly ...
The vulnerability, with a CVSS score of 9.8, relates to the software’s support for Model Context Protocol (MCP) servers, ...
Remote terminal units, PLCs, PoS systems, and bedside patient monitors may be susceptible to remote code execution, ...
A newly identified threat group, UNC6692, has been caught running a sophisticated cyberattack campaign that uses Microsoft ...