Google overhauls its Android and Chrome vulnerability rewards programs, offering bounties of up to $1.5 million for the most ...
The North Korean hacker group APT37 has been delivering an Android version of a backdoor called BirdCall in a supply-chain ...
A new version of the CloudZ remote access tool (RAT) is deploying a previously unseen malicious plugin called Pheno that ...
A Latvian national extradited to the United States was sentenced to 8.5 years in prison for his "cold case" negotiator role ...
Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since ...
Cybersecurity firm Trellix disclosed a data breach after attackers gained access to "a portion" of its source code repository ...
A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a ...
Fraudsters aren't hacking credit unions, they are exploiting normal business processes. Flare reveals how structured loan ...
Progress Software warned customers to patch a critical authentication bypass vulnerability in its MOVEit Automation ...
Security breaches don't just test your defenses—they test your recovery. Join Kaseya in our upcoming webinar to learn how ...
CISA has warned that threat actors have started exploiting the "Copy Fail" Linux security vulnerability in the wild, one day ...
Microsoft has confirmed that the April 2026 security updates are causing failures in third-party backup applications using ...