Oracle vulnerability (CVE-2026-21992) impacts core products
Categories: Threat Research Tags: advisory, vulnerability, Oracle
Noindex workflow category for imported/news content.
Categories: Threat Research Tags: advisory, vulnerability, Oracle
Keenadu malware gives an attacker control over a device but appears to be used primarily to facilitate ad fraud Categories: Threat Research Tags: Android, Keenadu
It’s nearly impossible not to be watched these days. It can start right at home with your neighbors and their Ring cameras—a company that sold fear to the American public and is now integrating AI to turn entire neighborhoods into networked, automated surveillance systems. Head out a bit further and you’ll likely be confronted by…
Clients of a long-running email marketing platform are getting targeted with a phishing campaign telling them that their emails would begin automatically inserting a “‘Support ICE’ donation button” into every email they send. The strategy suggests that scammers are trying to capitalize on people’s revulsion to ICE by coming up with strategies that would cause…
The FBI is using artificial intelligence in what it describes as “remote access operations,” FBI parlance for hacking, according to an FBI official. The comments, given at a national security and AI conference 404 Media was attending, give an unusually candid admission of the FBI’s use of hacking tools, which are often shrouded in secrecy….
Categories: Threat Research Tags: advisory, vulnerability, SD-WAN
A newly released tool claims it can bypass Discord’s age verification system by allowing users to control a 3D model of a computer-generated man in their browser instead of scanning their real face. On Monday, Discord announced it was launching teen-by-default settings globally, meaning that more users may be required to verify their age by…
This issue of the Counter Threat Unit’s high-level bimonthly report discusses noteworthy updates in the threat landscape during September and October Categories: Threat Research Tags: EDR killer, infostealer, Ransomware
Hackers claimed on Wednesday they’ve stolen a mass of internal data from Match Group, which runs dating apps Hinge, Match, and OkCupid. Match Group, the company that owns the targeted platforms as well as Tinder and other massively popular dating apps, says it is investigating the incident. 404 Media downloaded the data and reviewed portions…
Most ransomware attacks are opportunistic, not targeted at a specific sector or region Categories: Threat Research Tags: Ransomware, cybercrime, state-sponsored ransomware, victimization