News
Turla’s Kazuar v3 Loader Leverages Event Tracing for Windows and Bypasses Antimalware Scan Interface
1+ hour, 51+ min ago (594+ words) Turla, a sophisticated threat actor known for targeted cyber attacks, has deployed an upgraded version of its Kazuar v3 loader that introduces advanced evasion techniques designed to bypass modern security defenses. This latest iteration, discovered in January 2026, showcases a remarkable evolution…...
Critical Cal.com Vulnerability Let Attackers Bypass Authentication and Hijack any User Account
2+ hour, 46+ min ago (221+ words) A critical authentication bypass vulnerability in Cal.com's scheduling platform enables attackers to hijack any user account by exploiting a flaw in the NextAuth JWT callback mechanism. Tracked as CVE-2026-23478, this vulnerability affects versions from 3.1.6 up to but not including…...
Palo Alto Networks Firewall Vulnerability Allows Attackers to Trigger Denial of Service
10+ hour, 13+ min ago (196+ words) The flaw carries a CVSS v4.0 base score of 7.7 (HIGH severity), stemming from improper checks for unusual conditions that force firewalls into maintenance mode after repeated exploitation attempts. Published on January 14, 2026, the issue affects multiple PAN-OS versions but spares Cloud NGFW…...
Microsoft SQL Server Vulnerability Allows Attackers to Elevate Privileges over a Network
11+ hour, 14+ min ago (182+ words) Microsoft released security updates on January 13, 2026, addressing a critical elevation of privilege vulnerability in SQL Server that enables authorized attackers to bypass authentication controls and gain elevated system privileges remotely. The flaw affects multiple SQL Server versions, including SQL Server…...
Stealthy CastleLoader Malware Attacking US Government Agencies and Critical Infrastructure
17+ hour, 43+ min ago (546+ words) A sophisticated malware loader known as CastleLoader has emerged as a critical threat to US government agencies and critical infrastructure organizations. First identified in early 2025, this stealthy malware has been used as the initial access point in coordinated attacks targeting…...
New One-Click Microsoft Copilot Vulnerability Grants Attackers Undetected Access to Sensitive Data
20+ hour, 53+ min ago (312+ words) A novel single-click attack targeting Microsoft Copilot Personal that enables attackers to silently exfiltrate sensitive user data. The vulnerability, now patched, allowed threat actors to hijack sessions via a phishing link without further interaction." Attackers initiate Reprompt by sending a…...
Critical FortiSIEM Vulnerability(CVE-2025-64155) Enable Full RCE and Root Compromise
23+ hour, 10+ min ago (272+ words) In August 2025, Fortinet issued an advisory for CVE-2025-25256, an OS command injection vulnerability (CWE-78) in FortiSIEM that exposed the platform to unauthenticated remote code execution via crafted CLI requests. Practical exploits surfaced in the wild, prompting security firm Horizon3.ai to…...
As Third-Party Vulnerabilities Rise, CISOs Accelerate Push for Security Modernization
23+ hour, 23+ min ago (693+ words) Panorays'has just dropped the latest edition of its annual CISO Survey for Third-Party Cyber Risk Management, and it'contains'some major wakeup calls for security professionals. The biggest takeaway is that software'supply chain attacks'are'rising once more, as cybercriminals look to take advantage…...
VVS Stealer Attacking Discord Users to Exfiltrate Credentials and Tokens
23+ hour, 59+ min ago (546+ words) Discord users are facing a growing threat from VVS Stealer, a Python-based information-stealing malware that targets sensitive account data, including credentials and tokens. This stealer was actively marketed on Telegram as early as April 2025, promoting its ability to steal Discord…...
Threat Actors Targeting Ukraine's Defense Forces with Charity-Themed Malware Campaign
1+ day, 1+ hour ago (369+ words) Threat actors have launched a sophisticated malware campaign against members of Ukraine's Defense Forces, exploiting charity operations as a cover for their attacks. The initial infection chain relies on convincing targets to visit fake charity foundation websites through messages sent…...