News

Companies need to rethink how they protect their private and public use of AI and how they defend against AI-powered attacks.
Not every security vulnerability is high risk on its own - but in the hands of an advanced attacker, even small weaknesses ...
Government and telecommunications sectors in Southeast Asia have become the target of a "sophisticated" campaign undertaken ...
Threat actors exploited Craft CMS zero-days CVE-2025-32432 and CVE-2024-58136, compromising 300 of 13,000 vulnerable servers.
I'd buttoned things up pretty nicely from a security standpoint, but even so, it would only have taken a vulnerability in an ...
Cybercriminals are targeting WooCommerce users with fake patch emails that use IDN homograph spoofing to deliver backdoor malware.
Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud ...
ToyMaker deploys LAGTOY malware to steal credentials and sell access to CACTUS ransomware groups for double extortion.
Lotus Panda breached 6 Southeast Asian organizations using custom tools, browser stealers, and sideloaded malware.
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully ...
Non-Human Identities, for the most part, authenticate using secrets: API keys, tokens, certificates, and other credentials ...
The solution provides 99% discovery and visibility of all users, workloads, and devices across IT, IoT, OT, and IoMT ...