News
Over 40 malicious Firefox extensions impersonating popular crypto wallets have been uncovered, putting digital assets at risk ...
It's worth noting that IconAds is a variant of a threat that's also tracked by other cybersecurity vendors under the names ...
Chinese hackers exploited Ivanti CSA zero-days, targeting French government, media, and telecom sectors in September 2024.
Adaptive AI platforms for SOCs offer real-time alert triage, faster response times, and full-spectrum security coverage.
Cisco has released security updates to address a maximum-severity security flaw in Unified Communications Manager (Unified CM) and Unified Communications Manager Session Management Edition (Unified CM ...
North Korean cyber group targets Web3 businesses with Nim-based malware, exploiting AppleScript and Telegram for persistent ...
Proofpoint tracks overlapping tactics of TA829 and UNK_GreenSec, deploying TransferLoader and RomCom RAT globally.
Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic ...
Phishing campaigns use PDF attachments and callback phishing to exploit brands like Microsoft and DocuSign, affecting ...
U.S. sanctions Russian BPH provider Aeza Group for hosting ransomware attacks, dark web drugs, and cybercrime.
A security flaw in IDEs like Visual Studio Code lets attackers bypass extension verification, running malicious code on ...
CVE-2025-6554 is the fourth zero-day vulnerability in Chrome to be addressed by Google since the start of the year after ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results