Android Developer Verification Rollout Begins Ahead of September Enforcement
Google on Monday said it's officially rolling out Android de…
Google on Monday said it's officially rolling out Android de…
The cybersecurity landscape is accelerating at an unprecedented …
The popular HTTP client known as Axios has suffered a supply cha…
A previously unknown vulnerability in OpenAI ChatGPT allowed sen…
What is really slowing Tier 1 down: the threat itself or the pro…
Secrets sprawl isn't slowing down: in 2025, it accelerated f…
Cybersecurity researchers have discovered a remote access toolki…
Three threat activity clusters aligned with China have targeted …
A recently disclosed critical security flaw impacting Citrix Net…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
Apple is now sending Lock Screen notifications to iPhones and iP…
A pro-Ukrainian group called Bearlyfy has been attributed to mor…
Cybersecurity researchers have disclosed three security vulnerab…
A long-term and ongoing campaign attributed to a China-nexus thr…
The kernel exploit for two security vulnerabilities used in the …
Cybersecurity researchers have discovered a new payment skimmer …
The alleged administrator of the LeakBase cybercrime forum has b…
Cybersecurity researchers are calling attention to an active dev…
The U.S. Federal Communications Commission (FCC) said on Monday …
TeamPCP, the threat actor behind the recent compromises of Trivy…
A large-scale malvertising campaign active since January 2026 ha…
Two more GitHub Actions workflows have become the latest to be c…
Citrix has released security updates to address two vulnerabilit…
The North Korean threat actors behind the Contagious Interview c…
AWS Bedrock is Amazon's platform for building AI-powered app…
Microsoft has warned of fresh campaigns that are capitalizing on…
Cybersecurity researchers have uncovered malicious artifacts dis…
Threat actors are suspected to be exploiting a maximum-severity …
Oracle has released security updates to address a critical secur…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
The threat actors behind the supply chain attack targeting the p…
Trivy, a popular open-source vulnerability scanner maintained by…
Cybersecurity researchers have flagged a new malware dubbed Spea…
A new analysis of endpoint detection and response (EDR) killers …
Cybersecurity researchers have disclosed a new Android malware f…
Security teams have spent years building identity and access con…
A new exploit kit for Apple iOS devices designed to steal sensit…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
A high-severity security flaw affecting default installations of…
Apple on Tuesday released its first round of Background Security…
Cybersecurity researchers have disclosed a critical security fla…
Cybersecurity researchers have disclosed details of a new method…
A majority of security leaders are struggling to defend AI syste…
North Korean threat actors have been observed sending phishing t…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
The GlassWorm malware campaign is being used to fuel an ongoing …
Three different ClickFix campaigns have been found to act as a d…
Ukrainian entities have emerged as the target of a new campaign …
Google is testing a new security feature as part of Android Adva…
China's National Computer Network Emergency Response Technic…
Cybersecurity researchers have flagged a new iteration of the Gl…
Meta has announced plans to discontinue support for end-to-end e…
A court-authorized international law enforcement operation has d…
Veeam has released security updates to address multiple critical…
Cybersecurity researchers have disclosed details of a suspected …
Apple on Wednesday backported fixes for a security flaw in iOS, …
Cybersecurity researchers have discovered half-a-dozen new Andro…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
Agentic web browsers that leverage artificial intelligence (AI) …
A threat actor known as UNC6426 leveraged keys stolen following …
Cybersecurity researchers have discovered five malicious Rust cr…
Cybersecurity researchers are calling attention to a new campaig…
The Russian state-sponsored hacking group tracked as APT28 has b…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
Cybersecurity researchers have discovered a malicious npm packag…
Another week in cybersecurity. Another week of "you've …
Mid-market organizations are constantly striving to achieve secu…
Two Google Chrome extensions have turned malicious after what ap…
High-value organizations located in South, Southeast, and East A…
OpenAI on Friday began rolling out Codex Security, an artificial…
Anthropic on Friday said it discovered 22 new security vulnerabi…
New research from Broadcom's Symantec and Carbon Black Threa…
A China-linked advanced persistent threat (APT) actor has been t…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
Cybersecurity researchers have disclosed details of a new Russia…
A joint law enforcement operation has dismantled LeakBase, one o…
Cybersecurity researchers have warned of a surge in retaliatory …
Cybersecurity researchers have flagged malicious Packagist PHP p…
Cybersecurity researchers have disclosed details of an advanced …
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
Threat hunters have called attention to a new campaign as part o…
Cybersecurity researchers have disclosed details of a new phishi…
Microsoft on Monday warned of phishing campaigns that employ phi…
The threat activity cluster known as SloppyLemming has been attr…
This week is not about one big event. It shows where things are …
Most SaaS teams remember the day their user traffic started grow…
A recently disclosed security flaw patched by Microsoft may have…
Cybersecurity researchers have disclosed a new iteration of the …