WrtHug Abuse of ASUS WRT Vulnerabilities Exposes Thousands of EoL Routers
Operation WrtHug refers to a widespread compromise of end-of-life (EoL) ASUS routers, where attackers exploit previously disclosed vulnerabilities to gain…
Operation WrtHug refers to a widespread compromise of end-of-life (EoL) ASUS routers, where attackers exploit previously disclosed vulnerabilities to gain…
A security vulnerability in the widely used 7-Zip file archiver has recently come under active exploitation. The flaw, identified as…
Heads up, Chrome users! An actively exploited zero-day vulnerability, CVE-2025-13223, has been identified in Google Chrome’s V8 JavaScript and WebAssembly…
Google has filed a complaint in court that details the scam: In a complaint filed Wednesday, the tech giant accused…
Fortinet has recently addressed two actively exploited zero-days in its FortiWeb web application firewall (WAF). These flaws, a command injection…
Kendra Albert gave an excellent talk at USENIX Security this year, pointing out that the legal agreements surrounding vulnerability disclosure…
Zero-day vulnerabilities sit at the center of many high-profile cyberattacks. Security teams race to defend their environments, while attackers exploit…
DoorDash says a social engineering attack led to a data breach exposing names, addresses, emails, and phone numbers of users,…
Social media has been a familiar, even mundane, part of life for nearly two decades. It can be easy to…
The next three in this series on online events highlighting interesting uses of AI in cybersecurity are online: #4, #5,…