PM This week in cybersecurity: botnets, RCE flaws, AI-driven attacks, stealers, and more. Fast, no-fluff roundup.
The design flaw in Flowise’s Custom MCP node has allowed attackers to execute arbitrary JavaScript through unvalidated ...
Threat actors have started exploiting CVE-2025-59528, a critical Flowise vulnerability leading to remote code execution.
The UAT-10608 hacking group is using automated scanning and scripts to exploit React2Shell in a large-scale credential ...
If you have been in the music industry for even one month, Audacity will be nothing new. Audacity is one of the best professionally designed audio editing tools available for free on different ...
The biggest story of the week is a new massive supply chain breach, which appears to be unrelated to the previous massive supply chain breaches, this time of the Axios HTTP project. Axios was ...
Strapi plugins exploit Redis and PostgreSQL via postinstall scripts, enabling persistent access and data theft.
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.
As enterprises rely more heavily on AI technologies and services, attackers’ living-off-the-land techniques have evolved to ...
Cloudflare created an open-source CMS it calls a "spiritual successor to WordPress" — but WordPress is having none of it.
The Internet Bug Bounty program has paused new submissions, citing a massive expansion in vulnerability discovery by AI code ...