New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
Two information disclosure flaws have been identified in apport …
Two information disclosure flaws have been identified in apport …
A multinational law enforcement operation has resulted in the ta…
Breaking Out of the Security Mosh Pit When Jason Elrod, CISO of …
The U.S. Department of Treasury's Office of Foreign Assets C…
ConnectWise, the developer of remote access and support software…
Meta on Thursday revealed that it disrupted three covert influen…
Google on Wednesday disclosed that the Chinese state-sponsored t…
Cybersecurity researchers have disclosed a critical unpatched se…
The Czech Republic on Wednesday formally accused a threat actor …
Would you expect an end user to log on to a cybercriminal’s comp…
Cybersecurity researchers have disclosed details of a coordinate…
Apple on Tuesday revealed that it prevented over $9 billion in f…
Cybersecurity researchers have disclosed a new malicious campaig…
Artificial intelligence is driving a massive shift in enterprise…
Threat hunters have exposed a novel campaign that makes use of s…
The U.S. Federal Bureau of Investigation (FBI) has warned of soc…
The Russia-aligned threat actor known as TAG-110 has been observ…
As many as 60 malicious npm packages have been discovered in the…
Are your web privacy controls protecting your users, or just a b…
Cyber threats don't show up one at a time anymore. They’re l…
Cybersecurity researchers have disclosed a malware campaign that…
The malware known as Latrodectus has become the latest to embrac…
From zero-day exploits to large-scale bot attacks — the demand f…
The U.S. Department of Justice (DoJ) on Thursday announced the d…
Cybersecurity researchers have discovered an indirect prompt inj…
Cybersecurity researchers have uncovered multiple critical secur…
For many organizations, identity security appears to be under co…
A sprawling operation undertaken by global law enforcement agenc…
Russian cyber threat actors have been attributed to a state-spon…
Continuous Integration and Continuous Delivery/Deployment (CI/CD…
It takes just one email to compromise an entire system. A single…
Cybersecurity researchers have discovered a new campaign that em…
Google has announced a new feature in its Chrome browser that le…
In the newly released 2025 State of Pentesting Report, Pentera s…
Threat hunters have exposed the tactics of a China-aligned threa…
Cybersecurity researchers are calling attention to a new Linux c…
Cybersecurity researchers have uncovered malicious packages uplo…
Several ransomware actors are using a malware called Skitnet as …
Cybersecurity leaders aren’t just dealing with attacks—they’re a…
Data is the lifeblood of productivity, and protecting sensitive …
Researchers at ETH Zürich have discovered yet another security f…
Cybersecurity researchers have shed light on a new malware campa…
Modern apps move fast—faster than most security teams can keep u…
Cybersecurity researchers have discovered a malicious package na…
Google on Wednesday released updates to address four security is…
At least two different cybercrime groups BianLian and RansomExx …
Cybersecurity researchers have discovered a new phishing campaig…
Microsoft on Tuesday shipped fixes to address a total of 78 secu…
Ivanti has released security updates to address two security fla…
The cybersecurity landscape has been dramatically reshaped by th…
The North Korea-linked threat actor known as Konni APT has been …
Moldovan law enforcement authorities have arrested a 45-year-old…
A Türkiye-affiliated threat actor exploited a zero-day security …
ASUS has released updates to address two security flaws impactin…
What do a source code editor, a smart billboard, and a web serve…
Detecting leaked credentials is only half the battle. The real c…
Threat actors have been observed leveraging fake artificial inte…
Germany's Federal Criminal Police Office (aka Bundeskriminal…
Cybersecurity researchers have flagged three malicious npm packa…
The Vulnerability Treadmill The reactive nature of vulnerability…
Google on Thursday announced it's rolling out new artificial…
A China-linked unnamed threat actor dubbed Chaya_004 has been ob…
61% of security leaders reported suffering a breach due to faile…
The nation-state threat actor known as MirrorFace has been obser…
The Russia-linked threat actor known as COLDRIVER has been obser…
Cisco has released software fixes to address a maximum-severity …
Security Service Edge (SSE) platforms have become the go-to arch…
Threat actors with links to the Play ransomware family exploited…
Cybersecurity researchers have discovered a malicious package on…
A federal jury on Tuesday decided that NSO Group must pay Meta-o…
A recently disclosed critical security flaw impacting the open-s…
Cybersecurity researchers have disclosed a series of now-patched…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
What if attackers aren't breaking in—they're already ins…
Let’s be honest: if you're one of the first (or the first) s…
The threat actors known as Golden Chickens have been attributed …
Cybersecurity researchers have discovered three malicious Go mod…
An Iranian state-sponsored threat group has been attributed to a…
The U.S. Department of Justice (DoJ) on Thursday announced charg…
Ireland's Data Protection Commission (DPC) on Tuesday fined …
Run by the team at workflow orchestration and AI platform Tines,…
The malware loader known as MintsLoader has been used to deliver…
A year after Microsoft announced passkeys support for consumer a…
For over a decade, application security teams have faced a bruta…
Russian companies have been targeted as part of a large-scale ph…
Enterprise data backup platform Commvault has revealed that an u…
SonicWall has revealed that two now-patched security flaws impac…