News

CISA adds four critical vulnerabilities to its KEV list, with active exploitation confirmed. Federal agencies must update by ...
According to data compiled by Kaspersky, small- and medium-sized businesses (SMBs) are being increasingly targeted by cyber ...
Default passwords like "1111" put critical infrastructure at risk. CISA urges manufacturers to fix this vulnerability.
The activity has been attributed by Recorded Future's Insikt Group to a threat actor tracked as TAG-140, which it said ...
AI accelerates security but needs human oversight to prevent risks like misconfigurations and compliance errors. Ensure AI ...
Threat actors leverage exposed JDWP interfaces for code execution and cryptocurrency mining, with global scanning activity ...
It's worth noting that IconAds is a variant of a threat that's also tracked by other cybersecurity vendors under the names ...
Chinese hackers exploited Ivanti CSA zero-days, targeting French government, media, and telecom sectors in September 2024.
Two critical vulnerabilities in Sudo command-line tool allow privilege escalation for local attackers on Linux systems ...
Adaptive AI platforms for SOCs offer real-time alert triage, faster response times, and full-spectrum security coverage.
Proofpoint tracks overlapping tactics of TA829 and UNK_GreenSec, deploying TransferLoader and RomCom RAT globally.
North Korean cyber group targets Web3 businesses with Nim-based malware, exploiting AppleScript and Telegram for persistent ...