News

The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.
Google Cloud Build vulnerability earns researcher bounty, more countries hit by Louis Vuitton breach, attack surface ...
Christina Chapman was sentenced to prison for helping North Korean IT workers infiltrate US companies and running a laptop ...
LG Innotek LNV5110R security cameras are affected by a vulnerability that can be exploited for unauthenticated remote code ...
More information has emerged on the ToolShell SharePoint zero-day attacks, including impact, victims, and threat actors.
Proposed New York State cyber regulations for the water and wastewater sector include the implementation of various security ...
Clorox is blaming Congnizat for the 2023 cyberattack, claiming that the IT provided handed over passwords to the hackers.
Ollie Holman was sentenced to prison for selling over 1,000 phishing kits that caused estimated losses of over $134 million.
SonicWall advises organizations to patch SMA 100 appliances and look for IoCs associated with Overstep malware attacks.
President Donald Trump has unveiled a sweeping new plan for America’s “global dominance” in artificial intelligence.
A surveillance company was caught using an SS7 bypass technique to trick wireless carriers into divulging users’ locations.
An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.