News
New Progress ShareFile Vulnerabilities Enable Server Takeover with No Login Required
19+ hour, 32+ min ago (423+ words) Security researchers at watchTowr Labs have disclosed a critical exploit chain targeting the Progress ShareFile Storage Zone Controller, a widely deployed on-premises file-sharing gateway used across enterprise and regulated environments. The vulnerability chain, tracked as CVE-2026-2699 and CVE-2026-2701, enables completely…...
Microsoft Pushes Forced Upgrade to Windows 11 Version 24H2 for Unmanaged PCs
19+ hour, 53+ min ago (343+ words) Microsoft has launched an automated, machine-learning-driven rollout to forcibly upgrade unmanaged Windows 11 Home and Pro devices from version 24H2 to the latest version 25H2, marking a significant shift in how the company handles consumer OS lifecycle management. For consumers and small businesses…...
CISA Adds TrueConf Flaw to KEV Catalog Amid Active Exploitation
20+ hour, 38+ min ago (417+ words) The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability affecting the TrueConf Client to its Known Exploited Vulnerabilities (KEV) catalog, effective April 2, 2026. The addition confirms that threat actors are actively weaponizing this flaw in real-world attacks,…...
Infrastructure Engineer Pleads Guilty to Locking 254 Company Windows Servers
20+ hour, 10+ min ago (383+ words) A former core infrastructure engineer has pleaded guilty to federal hacking and extortion charges after orchestrating a devastating cyberattack against his own employer, locking hundreds of servers and demanding a Bitcoin ransom. Daniel Rhyne, 59, entered his guilty plea on April…...
Critical TP-Link Flaws Enable Attackers to Crash Routers and Cause DoS
23+ hour, 10+ min ago (374+ words) TP-Link has patched a set of severe security vulnerabilities affecting the Tapo C520WS outdoor security camera, a widely used device for home and business surveillance. The flaws tracked as CVE-2026-34118 through CVE-2026-34124 range from heap and stack-based buffer overflows to a…...
AI Models Like Gemini 3 and Claude 4.5 Found Secretly Protecting Each Other
22+ hour, 50+ min ago (14+ words) AI Models Like Gemini 3 and Claude 4.5 Found Secretly Protecting Each Other'cyberpress.org...
14,000+ F5 BIG-IP APM Instances Exposed as RCE Exploits Surge
21+ hour, 28+ min ago (383+ words) The vulnerability, tracked as CVE-2025-53521, was first disclosed on October 15, 2025, and initially classified as a relatively lower-risk Denial of Service (DoS) flaw with a CVSS score of 7.5. However, in March 2026, F5 dramatically revised its advisory, confirming that the same flaw enables…...
Malicious “ChatGPT Ad Blocker” Extension Steals User Conversations
22+ hour, 23+ min ago (315+ words) The extension exploits growing user frustration over OpenAI's recent move to display advertisements to free-tier ChatGPT users, posing as a solution while secretly operating as spyware. Rather than blocking ads, the extension systematically steals user prompts, chat history, and metadata…...
Trusted Online Platforms Exploited In Credential Theft Attacks Targeting Filipinos
22+ hour, 20+ min ago (363+ words) Group-IB, the widespread availability of free hosting platforms allows attackers to build and distribute phishing campaigns with minimal effort, making operations highly scalable. The threat actors distributed phishing emails with varying social engineering narratives to lure victims. Throughout 2024, emails typically…...
New Ransomware Strain Mimicking Akira Targets Windows Systems In South America
1+ day, 3+ hour ago (413+ words) Cybersecurity researchers from ESET have uncovered a highly deceptive ransomware campaign focused on organizations in South America. While the attacks bear all the visual hallmarks of the notorious Akira ransomware group, investigators have confirmed this is a sophisticated lookalike operation....