Unlike traditional cyberattacks, which target systems and data, psychological warfare targets people. Here's what ...
A bank, an airport, a non-profit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign ...
The number of zero-day vulnerabilities uncovered in enterprise software and appliances reached an all-time high last year, analysis by Google Threat Intelligence Group (GTIG) has warned. In the report ...
Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast ...
A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G ...
Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction ...
Networking giant Cisco has released 25 joint security advisories covering security patches for 48 vulnerabilities in across its Secure Firewall Adaptive Security Appliance (ASA), Secure Firewall ...
A surge in attempts to compromise internet-connected surveillance cameras across the Middle East has been identified during the ongoing regional conflict, with activity attributed to infrastructure ...
LeakBase was an English-language site operating on the surface web which facilitated an illegal trade in stolen data, including stealer logs - archives of stolen credentials harvested through ...
The data leak comes amid increased scrutiny of Iran's financial system and its growing reliance on digital assets. In January ...
The flaw was discovered by Noma Labs researchers in the Context7 platform operated by Upstash. Context7 is used by developers to provide AI assistants such as Cursor, Claude Code and Windsurf with ...
John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results