Apple has released yet another round of security patches to address three actively exploited zero-day...
A previously undocumented threat actor dubbed Sandman has been attributed to a set of cyber attacks targeting...
The peer-to-peer (P2) worm known as P2PInfect has witnessed a surge in activity since late August 2023,...
Security teams are familiar with threats emanating from third-party applications that employees add to improve...
The data leaked included Microsoft Teams messages, passwords and private keys...
China’s Ministry of State Security (MSS) has accused the U.S. of breaking into Huawei’s servers,...
A financially motivated threat actor has been outed as an initial access broker (IAB) that...
The maintainers of Free Download Manager (FDM) have acknowledged a security incident dating back to...
A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR vulnerability...
The NCSC has published new cryptographic research on robust cryptography – we explain its significance...
Finnish law enforcement authorities have announced the takedown of PIILOPUOTI, a dark web marketplace that...
Multiple security flaws have been disclosed in the Nagios XI network monitoring software that could...
Two NIST evaluation studies will help software better detect photo spoofs and image quality issues....
Well, you shouldn’t. It may already be hiding vulnerabilities. It’s the modular nature of modern...
Cybersecurity researchers have discovered a fresh batch of malicious packages in the npm package registry...
Chinese-language speakers have been increasingly targeted as part of multiple email phishing campaigns that aim...
Encrypted messaging app Signal has announced an update to the Signal Protocol to add support...
GitLab has shipped security patches to resolve a critical flaw that allows an attacker to...
Cybersecurity company Trend Micro has released patches and hotfixes to address a critical security flaw in Apex...
Telecommunication service providers in the Middle East are the target of a new intrusion set...
Targets located in Azerbaijan have been singled out as part of a new campaign that’s...
As your alarm goes off you roll over and pick up your phone. Turning the...
XWorm is a relatively new representative of the remote access trojan cohort that has already...
The China-linked threat actor known as Earth Lusca has been observed targeting government entities using a never-before-seen...
As the adoption of generative AI tools, like ChatGPT, continues to surge, so does the...
New research has found that close to 12,000 internet-exposed Juniper firewall devices are vulnerable to...
The suspected Pakistan-linked threat actor known as Transparent Tribe is using malicious Android apps mimicking YouTube to...
Microsoft on Monday said it took steps to correct a glaring security gaffe that led...
The collaborative process to update the NIST Cybersecurity Framework (CSF), toward CSF 2.0 , continues!...
The collaborative process to update the NIST Cybersecurity Framework (CSF), toward CSF 2.0, continues! This...