Skip to content
Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload

Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload

The most dangerous phishing campaigns aren’t just designed to fool employees. Many are designed to exhaust the analysts investigating them. When a phishing investigation takes 12 hours instead of five minutes, the outcome can shift… 

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud. The Android malware range from traditional banking trojans like PixRevolution, TaxiSpy RAT,… 

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

Ravie LakshmananMar 12, 2026Vulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of… 

Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

Ravie LakshmananMar 11, 2026Artificial Intelligence / Browser Security Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could be trained and tricked into… 

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Ravie LakshmananMar 11, 2026 Vulnerability / Application Security Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs that could result in arbitrary command execution.… 

Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown

Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown

Ravie LakshmananMar 11, 2026Cybercrime / Artificial Intelligence Meta on Wednesday said it disabled over 150,000 accounts associated with scam centers in Southeast Asia as part of a coordinated effort in partnership with authorities from Thailand,… 

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

Ravie LakshmananMar 11, 2026Vulnerability / Enterprise Security SAP has released security updates to address two critical security flaws that could be exploited to achieve arbitrary code execution on affected systems. The vulnerabilities in question listed…