A critical vulnerability in Citrix’s NetScaler products allows unauthenticated remote attackers to leak information from the ...
The head of the UK’s NCSC is calling the cybersecurity industry to “seize the disruptive vibe coding opportunity” to make ...
A series of cyber campaigns linked to the Silver Fox intrusion group has revealed a shift in tactics between 2025 and 2026, ...
Poor patch management, increasingly complex IT environments and continued use of obsolete software puts organizations at risk ...
The Handala group, which claimed responsibility for a recent wiper attack on US medtech firm Stryker, is said to be linked to Tehran’s Ministry of Intelligence and Security (MOIS). It was pegged for ...
A new malicious npm campaign using fake installation logs to hide malware activity has been identified by security researchers. The attacks, discovered by ReversingLabs, involve malicious packages ...
Geopolitics and cyber warfare take center stage at Infosecurity Europe as Dmytro Kuleba discusses Ukraine’s hybrid war experience ...
Russian cybercriminal Aleksei Volkov has received close to seven years behind bars for role in Yanluowang ransomware ...
ISACA survey found that confusion over responsibility and lack of understanding around AI cyber-attacks makes containing them difficult ...
A Europol-backed law enforcement operation has led to the dismantling of over 373,000 dark web sites advertising child sexual ...
Allianz cyber educator and ENISA advisor Daria Catalui on human firewalls, people‑first security, cyber education and training for the AI era ...
A new set of compromised Docker images linked to the Trivy supply chain attack has been identified, expanding the impact of the incident across developer environments and CI/CD pipelines. On March 19, ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results