News
Two critical vulnerabilities in Sudo command-line tool allow privilege escalation for local attackers on Linux systems ...
Google has been ordered by a court in the U.S. state of California to pay $314 million over charges that it misused Android ...
It's worth noting that IconAds is a variant of a threat that's also tracked by other cybersecurity vendors under the names ...
Over 40 malicious Firefox extensions impersonating popular crypto wallets have been uncovered, putting digital assets at risk ...
Chinese hackers exploited Ivanti CSA zero-days, targeting French government, media, and telecom sectors in September 2024.
Cisco has released security updates to address a maximum-severity security flaw in Unified Communications Manager (Unified CM) and Unified Communications Manager Session Management Edition (Unified CM ...
North Korean cyber group targets Web3 businesses with Nim-based malware, exploiting AppleScript and Telegram for persistent ...
Phishing campaigns use PDF attachments and callback phishing to exploit brands like Microsoft and DocuSign, affecting ...
SOCs face evolving cyber threats as 80% of attacks mimic user behavior. Discover how multi-layered NDR detection strategies ...
U.S. sanctions Russian BPH provider Aeza Group for hosting ransomware attacks, dark web drugs, and cybercrime.
Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to ...
Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results