News

Companies need to rethink how they protect their private and public use of AI and how they defend against AI-powered attacks. Traditional firewalls, VPNs, and public-facing IPs expose your attack ...
Not every security vulnerability is high risk on its own - but in the hands of an advanced attacker, even small weaknesses ...
Government and telecommunications sectors in Southeast Asia have become the target of a "sophisticated" campaign undertaken ...
Cybercriminals are targeting WooCommerce users with fake patch emails that use IDN homograph spoofing to deliver backdoor malware.
Threat actors exploited Craft CMS zero-days CVE-2025-32432 and CVE-2024-58136, compromising 300 of 13,000 vulnerable servers.
I'd buttoned things up pretty nicely from a security standpoint, but even so, it would only have taken a vulnerability in an ...
Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud ...
The web shells grant the threat actor the ability to execute arbitrary commands in system context, with the privileges of the ...
ToyMaker deploys LAGTOY malware to steal credentials and sell access to CACTUS ransomware groups for double extortion.
"In 2023, UNC3782 conducted phishing operations against TRON users and transferred more than $137 million USD worth of assets ...
Darcula was first documented by the cybersecurity company in March 2024 as a toolkit that leveraged Apple iMessage and RCS to send smishing messages to users that trick recipients into clicking on ...
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully ...