Google overhauls its Android and Chrome vulnerability rewards programs, offering bounties of up to $1.5 million for the most ...
A Latvian national extradited to the United States was sentenced to 8.5 years in prison for his "cold case" negotiator role ...
A new version of the CloudZ remote access tool (RAT) is deploying a previously unseen malicious plugin called Pheno that ...
The North Korean hacker group APT37 has been delivering an Android version of a backdoor called BirdCall in a supply-chain ...
Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since ...
A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a ...
Cybersecurity firm Trellix disclosed a data breach after attackers gained access to "a portion" of its source code repository ...
Fraudsters aren't hacking credit unions, they are exploiting normal business processes. Flare reveals how structured loan ...
Progress Software warned customers to patch a critical authentication bypass vulnerability in its MOVEit Automation ...
Security breaches don't just test your defenses—they test your recovery. Join Kaseya in our upcoming webinar to learn how ...
CISA has warned that threat actors have started exploiting the "Copy Fail" Linux security vulnerability in the wild, one day ...
Microsoft has confirmed that the April 2026 security updates are causing failures in third-party backup applications using ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results