News

While Symantec couldn’t identify the initial infection vector used in the attack, Fog ransomware actors have used critical ...
CVE-2025-47172 , a remote code execution vulnerability in Microsoft SharePoint Server. With a CVSS score of 8.8, he said this ...
Strained budgets, overstretched teams, and a rise in sophisticated threats is leading to plummeting security confidence among ...
A new vulnerability in GitLab’s Ultimate Enterprise Edition used for managing source code is “dangerous” and needs to be ...
BrowserVenom is a malicious implant that reroutes and manipulates web traffic to collect sensitive browsing data.
Interpol, together with 26 countries and several cybersecurity companies, has carried out a major international operation ...
The packages carry backdoors that first collect environment information and then delete entire application directories.
An OpenAI report details a variety of techniques that the model maker is deploying against various attack methods, especially ...
Blame often falls on individuals when systems go unpatched. But more often, it reflects a process failure. A silent patch ...
Chrome extensions were spotted leaking sensitive browser data like API keys, secrets, and tokens via unguarded HTTP ...
FIN6’s latest campaign combines professional rapport-building with cloud-hosted malware delivery to target sensitive HR ...
The state of cloud security has reached a critical tipping point, as attackers increasingly turn attention to cloud ...