News

Allianz subsidiary said the information of customers, financial professionals and employees was compromised as a result of a ...
The emerging Chaos ransomware appears to be a rebranding of BlackSuit, which had its leak site seized by law enforcement.
The Post SMTP email delivery WordPress plugin is affected by a critical vulnerability and half of websites using it remain ...
The financially motivated group is pivoting from Active Directory to VMware vSphere environments, deploying ransomware from the hypervisor.
Google Cloud Build vulnerability earns researcher bounty, more countries hit by Louis Vuitton breach, attack surface ...
The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.
Ollie Holman was sentenced to prison for selling over 1,000 phishing kits that caused estimated losses of over $134 million.
More information has emerged on the ToolShell SharePoint zero-day attacks, including impact, victims, and threat actors.
The CitrixBleed 2 vulnerability in NetScaler may expose organizations to compromise even if patches have been applied.
Security Operations: 10 ways modern environments are undermining SOC effectiveness—and what enterprises must do to reclaim ...
Dell confirms the compromise of a demo environment containing synthetic data after hackers leak allegedly stolen information.
LG Innotek LNV5110R security cameras are affected by a vulnerability that can be exploited for unauthenticated remote code ...