EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
Intro A sophisticated, high-resilience malicious campaign was id…
Intro A sophisticated, high-resilience malicious campaign was id…
Cybersecurity researchers have disclosed details of a Linux loca…
Google has addressed a maximum severity security flaw in Gemini …
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
In yet another instance of threat actors quickly jumping on the …
Cybersecurity researchers have disclosed details of a critical s…
A cybercrime group of Brazilian origin has resurfaced after more…
When patching isn’t fast enough, NDR helps contain the next era …
A Chinese national accused of being a member of the Silk Typhoon…
Microsoft on Monday revised its advisory for a now-patched, high…
Cybersecurity researchers have flagged dozens of Microsoft Visua…
Cybersecurity researchers have disclosed details of a telecommun…
Cybersecurity researchers have discovered a new Lua-based malwar…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
Cybersecurity researchers have discovered a set of malicious app…
Chinese-speaking individuals are the target of a new campaign th…
A high-severity security flaw in LMDeploy, an open-source toolki…
A previously undocumented threat activity cluster known as UNC66…
Apple has rolled out a software fix for iOS and iPadOS to addres…
Cybersecurity researchers have warned of malicious images pushed…
Cybersecurity researchers have flagged a fresh set of packages t…
Microsoft has released out-of-band updates to address a security…
A critical security vulnerability has been disclosed in a Python…
Threat actors associated with The Gentlemen ransomware‑as‑a‑serv…
Cybersecurity researchers have discovered a vulnerability in Goo…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
A critical security vulnerability has been disclosed in SGLang t…
The fastest way to fall in love with an AI tool is to watch the …
Cybersecurity researchers have discovered a critical "by de…
Cybersecurity researchers have flagged a new malware called Zion…
Web infrastructure provider Vercel has disclosed a security brea…
Grinex, a Kyrgyzstan-incorporated cryptocurrency exchange sancti…
Threat actors are exploiting security flaws in TBK DVR and end‑o…
The National Institute of Standards and Technology (NIST) has an…
An international law enforcement operation has taken down 53 dom…
A recently disclosed high-severity security flaw in Apache Activ…
Cybersecurity researchers have warned of an active malicious cam…
A bank approved a Taboola pixel. That pixel quietly redirected l…
The Computer Emergencies Response Team of Ukraine (CERT-UA) has …
A number of critical vulnerabilities impacting products from Ado…
Few technologies have moved from experimentation to boardroom ma…
Microsoft on Tuesday released updates to address a record 169 se…
OpenAI on Tuesday unveiled GPT-5.4-Cyber, a variant of its lates…
Cybersecurity researchers have discovered a new campaign in whic…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
Monday is back, and the weekend’s backlog of chaos is officially…
Anthropic restricted its Mythos Preview model last week after it…
The North Korean hacking group tracked as APT37 (aka ScarCruft) …
OpenAI revealed a GitHub Actions workflow used to sign its macOS…
Adobe has released emergency updates to fix a critical security …
Hungarian domestic intelligence, the national police in El Salva…
A critical security vulnerability in Marimo, an open-source Pyth…
Google has made Device Bound Session Credentials (DBSC) generall…
Unknown threat actors have hijacked the update system for the Sm…
Details have emerged about a now-patched security vulnerability …
An apparent hack-for-hire campaign likely orchestrated by a thre…
Cybersecurity researchers have flagged a new variant ofmalware c…
The Fragmented State of Modern Enterprise Identity Enterprise IA…
Artificial Intelligence (AI) company Anthropic announced a new c…
The North Korea-linked persistent campaign known as Contagious I…
Iran-affiliated cyber actors are targeting internet-facing opera…
New academic research has identified multiple RowHammer attacks …
A China-based threat actor known for deploying Medusa ransomware…
Threat actors are exploiting a maximum-severity security flaw in…
An Iran-nexus threat actor is suspected to be behind a password-…
The most active piece of enterprise infrastructure in the compan…
Threat actors associated with Qilin and Warlock ransomware opera…
Germany's Federal Criminal Police Office (aka BKA or the Bun…
Drift has revealed that the April 1, 2026, attack that led to th…
Fortinet has released out-of-band patches for a critical securit…
A China-aligned threat actor has set its sights on European gove…
The next major breach hitting your clients probably won't co…
Solana-based decentralized exchange Drift has confirmed that att…
A large-scale credential harvesting operation has been observed …
In December 2025, we shared the first-ever The State of Trusted …
Meta-owned messaging platform WhatsApp said it alerted about 200…
Apple on Wednesday expanded the availability of iOS 18.7.7 and i…
The Computer Emergency Response Team of Ukraine (CERT-UA) has di…
For years, cybersecurity has followed a familiar model: block ma…
Google has formally attributed the supply chain compromise of th…
Anthropic on Tuesday confirmed that internal code for its popula…