Unlike traditional cyberattacks, which target systems and data, psychological warfare targets people. Here's what ...
A bank, an airport, a non-profit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign ...
The number of zero-day vulnerabilities uncovered in enterprise software and appliances reached an all-time high last year, analysis by Google Threat Intelligence Group (GTIG) has warned. In the report ...
Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast ...
John Hultquist suggests “aggressive” Iranian cyber attackers will target the US and its Gulf allies with plausibly deniable ...
A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G ...
Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction ...
A surge in attempts to compromise internet-connected surveillance cameras across the Middle East has been identified during the ongoing regional conflict, with activity attributed to infrastructure ...
Networking giant Cisco has released 25 joint security advisories covering security patches for 48 vulnerabilities in across its Secure Firewall Adaptive Security Appliance (ASA), Secure Firewall ...
The flaw was discovered by Noma Labs researchers in the Context7 platform operated by Upstash. Context7 is used by developers to provide AI assistants such as Cursor, Claude Code and Windsurf with ...
LeakBase was an English-language site operating on the surface web which facilitated an illegal trade in stolen data, including stealer logs - archives of stolen credentials harvested through ...
The data leak comes amid increased scrutiny of Iran's financial system and its growing reliance on digital assets. In January ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results