News

AI accelerates security but needs human oversight to prevent risks like misconfigurations and compliance errors. Ensure AI ...
The activity has been attributed by Recorded Future's Insikt Group to a threat actor tracked as TAG-140, which it said ...
Threat actors leverage exposed JDWP interfaces for code execution and cryptocurrency mining, with global scanning activity ...
Cybersecurity researchers uncover NightEagle APT exploiting zero-day in Microsoft Exchange servers, targeting government, ...
Taiwan NSB warns of security risks from Chinese apps, citing excessive data collection and sharing with China.
Google has been ordered by a court in the U.S. state of California to pay $314 million over charges that it misused Android ...
It's worth noting that IconAds is a variant of a threat that's also tracked by other cybersecurity vendors under the names ...
North Korean cyber group targets Web3 businesses with Nim-based malware, exploiting AppleScript and Telegram for persistent ...
Two critical vulnerabilities in Sudo command-line tool allow privilege escalation for local attackers on Linux systems ...
Proofpoint tracks overlapping tactics of TA829 and UNK_GreenSec, deploying TransferLoader and RomCom RAT globally.
Chinese hackers exploited Ivanti CSA zero-days, targeting French government, media, and telecom sectors in September 2024.
Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic ...