News
Companies need to rethink how they protect their private and public use of AI and how they defend against AI-powered attacks.
Not every security vulnerability is high risk on its own - but in the hands of an advanced attacker, even small weaknesses ...
Government and telecommunications sectors in Southeast Asia have become the target of a "sophisticated" campaign undertaken ...
I'd buttoned things up pretty nicely from a security standpoint, but even so, it would only have taken a vulnerability in an ...
Threat actors exploited Craft CMS zero-days CVE-2025-32432 and CVE-2024-58136, compromising 300 of 13,000 vulnerable servers.
Cybercriminals are targeting WooCommerce users with fake patch emails that use IDN homograph spoofing to deliver backdoor malware.
Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud ...
ToyMaker deploys LAGTOY malware to steal credentials and sell access to CACTUS ransomware groups for double extortion.
The exploitation of a security flaw in Innorix Agent for lateral movement is notable for the fact that a similar approach has ...
As many as 159 CVE identifiers have been flagged as exploited in the wild in the first quarter of 2025, up from 151 in Q4 ...
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully ...
Lotus Panda breached 6 Southeast Asian organizations using custom tools, browser stealers, and sideloaded malware.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results