A set of nine cross-tenant vulnerabilities in Google Looker Studio that could have enabled attackers to extract or manipulate ...
A new malware campaign targeting human resources and recruiting staff has seen attackers distribute malicious files disguised as job applications. The operation, uncovered by Aryaka Threat Research ...
In a welcome relief for sysadmins, Microsoft released security updates for just 79 vulnerabilities in this month’s Patch Tuesday yesterday, including two publicly disclosed zero-days. Microsoft ...
Infosecurity Europe 2026 reveals its keynote line-up, featuring Jason Fox, Shlomo Kramer, Cynthia Kaiser and more, with sessions on AI, cloud security and post quantum threats ...
The French Cybersecurity Agency (ANSSI) has confirmed the decline of known ransomware attacks in 2025, in part due to successful law enforcement operations. The latest edition of the agency’s annual ...
The security vendor’s February 2026 Global Threat Intelligence report revealed that it blocked an average of 2086 cyber-attacks per organization per week globally, a 9.8% year-on-year (YoY) increase.
Security and safety guardrails in generative AI tools, deployed to prevent malicious uses like prompt injection attacks, can themselves be hacked through a type of prompt injection. Researchers at ...
A widespread cyber-criminal campaign has compromised legitimate WordPress websites to infect visitors with infostealer malware, threat researchers at Rapid 7 have warned. The global operation has ...
Modern identity fraud has shifted from forging documents to manipulating the digital signals automated systems rely on to determine trust ...
ShinyHunters has a long track record of going after Salesforce customers, having targeted their instances on multiple occasions in connected campaigns last year.
A data breach affecting 15,661 Ericsson Inc. employees and customers has been disclosed after attackers compromised a third-party service provider used by the company. The incident involved ...
Just 24% of organizations test their identity disaster recovery plans every six months, according to new research which examined how businesses prepare for identity-focused cyber-attacks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results