CVE-2026-42208 exploited within 36 hours of disclosure, exposing LiteLLM credentials, risking cloud account compromise.
Designed for the ‘Mythos Era’, Miggo Pulse replaces reactive analysis with predictive exploit intelligence to identify and stop emerging threats before exploitationTEL AVIV, Israel, April 29, 2026 ...
Researchers are warning that the VECT 2.0 ransomware has a problem in the way it handles encryption nonces that leads to ...
Your databases are being watched. Just not by youMost organisations invest in perimeter security. The database – where the data actually lives – is the layer most often left ungoverned, says Johan ...
A critical vulnerability affecting all but the latest versions of cPanel and the WebHost Manager (WHM) dashboard could be ...
Health data has become a critical asset at the intersection of public health and national security, of which Ghana is no exception .
Forgotten integrations, shadow IT, SaaS, and now shadow AI and agents are everywhere, and attackers don't need sophisticated ...
Enterprise cybersecurity is entering a phase where speed is becoming the defining variable. The volume of vulnerabilities has ...
Cybercrime is no longer just scaling, it is evolving at a structural level. According to The State of Cybercrime 2026: Emerging Threats & Predictions by KELA, attackers are shifting from traditional ...
Threat actors have been exploiting the BlueHammer Microsoft Defender vulnerability as a zero-day to gain System privileges.
The April 2026 Vercel security incident continues to extend past initial claims. The incident, which was said to involve what ...
The breach is in the databaseSouth Africa’s breach record tells a consistent story – and it leads to the database layer.Issued by Ascent TechnologyJohannesburg, 23 Apr 2026 Active visibility at the ...