News

Dutch and U.S. law enforcement have dismantled a long-running criminal proxy botnet powered by over 7,000 infected IoT and ...
The current approach to vulnerability management is rooted in its name: focusing on "vulnerabilities" (as defined by CVE, ...
"The spam message uses the Brazilian electronic invoice system, NF-e, as a lure to entice users into clicking hyperlinks and ...
AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences ...
Malicious npm packages targeting Cursor macOS users stole credentials and disabled updates, impacting 3,200+ downloads.
China-based hackers exploited SAP flaw CVE-2025-31324 since April 29, impacting global industries via web shells.
Google on Thursday announced it's rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across ...
CVE-2025-32819 (CVSS score: 8.8) - A vulnerability in SMA100 allows a remote authenticated attacker with SSL-VPN user ...
"From July 2024 to January 2025, Qilin's affiliates did not disclose more than 23 companies per month," the Singaporean ...
MirrorFace deployed ROAMINGMOUSE and updated ANEL malware in March 2025 to target Japan and Taiwan's government systems ...
The scale of the campaign is reflected in the fact that over 38,000 distinct FreeDrain sub-domains hosting lure pages have ...
The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as part of an ...