News

The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.
Google Cloud Build vulnerability earns researcher bounty, more countries hit by Louis Vuitton breach, attack surface ...
Christina Chapman was sentenced to prison for helping North Korean IT workers infiltrate US companies and running a laptop ...
LG Innotek LNV5110R security cameras are affected by a vulnerability that can be exploited for unauthenticated remote code ...
More information has emerged on the ToolShell SharePoint zero-day attacks, including impact, victims, and threat actors.
Clorox is blaming Congnizat for the 2023 cyberattack, claiming that the IT provided handed over passwords to the hackers.
Ollie Holman was sentenced to prison for selling over 1,000 phishing kits that caused estimated losses of over $134 million.
SonicWall advises organizations to patch SMA 100 appliances and look for IoCs associated with Overstep malware attacks.
Proposed New York State cyber regulations for the water and wastewater sector include the implementation of various security ...
An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.
A surveillance company was caught using an SS7 bypass technique to trick wireless carriers into divulging users’ locations.
Dell confirms the compromise of a demo environment containing synthetic data after hackers leak allegedly stolen information.