News
Those affected are urged to take advantage of free identity theft protection services offered by the VC firm, change all ...
SonicWall said that threat actors accessed firewall preference files stored in the cloud for around 5% of its firewall ...
One of the teenage suspects, is accused of involvement in at least 120 attacks, resulting in $115m in ransom payments ...
Shadow AI is on the rise and security leaders must develop strategies to mitigate this risk while ensuring employees can ...
A significant share of mobile applications are exposing sensitive information through insecure APIs, leaving users and businesses vulnerable to attack. The 2025 Zimperium Global Mobile Threat Report, ...
Microsoft revealed it has seized 338 websites associated with RaccoonO365, a phishing kit which has stolen at least 5000 ...
British and American cybersecurity leaders are increasingly concerned about their expanding AI attack surface, particularly ...
The bundle.js script is designed to steal npm, GitHub, AWS and GCP tokens. But it also installs TruffleHog – an open source ...
A trio of critical vulnerabilities in the Chaos-Mesh platform allow in-cluster attackers to run arbitrary code, even in ...
An employee of outsourcing firm TaskUs allegedly sold data stolen during the Coinbase data breach to hackers for $200 per record before her arrest in January 2025 ...
AI-native Villager, which automates Kali and DeepSeek penetration tests, has reached 11,000 PyPI downloads fueling dual-use ...
For security leaders and development executives, vibe coding represents a strategic risk that requires proactive governance ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results