The security researchers from Zscaler ThreatLabz have also discovered five new tools deployed by the North Korean hacking ...
International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware ...
The UK government says its new Vulnerability Monitoring Service has cut unresolved security flaws by 75% and reduced cyber-attack fix times from nearly two months to just over a week ...
The impact of data breaches isn't just felt in cyberspace. Criminals use leaks to facilitate physical crimes too ...
A newly identified botnet loader is shifting command-and-control (C2) operations onto the Polygon blockchain, eliminating the ...
Eighty-seven percent of organizations have at least one exploitable software vulnerability in production, affecting 40% of ...
In a blog post, Google Threat Intelligence Group (GTIG) detailed the malicious activity by UNC2814, a cyber-espionage operation with suspected links to China which has been active since 2017. The ...
More than 32 million high-confidence phishing emails were detected by Darktrace in 2025, showcasing a substantial escalation in identity-driven cyber threats. The data was collected by Darktrace from ...
The US Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive requiring all federal agencies to find and patch the vulnerabilities by 5pm ET on February 27, 2026.
The UK’s Information Commissioner's Office is about to ditch single-leader model for CEO and board in a major shake-up ...
CrowdStrike Global Threat Report warns how adversaries are leveraging AI to make campaigns more efficient and more effective ...
Vulnerability exploitation emerged as the leading cause of incidents in 2025, accounting for 40% of cases observed by IBM X-Force. At the same time, active ransomware and extortion groups grew 49% ...