A new Gremlin stealer variant has evolved into a modular toolkit with advanced evasion and data theft capabilities, according ...
The zero-day vulnerability affects on-premises installations for all versions of Exchange Server 2016, 2019 and Subscription ...
A suspected China-linked threat actor targeted the Indian branch of a global manufacturer leveraging an open source offensive ...
OpenAI and Anthropic’s frontier AI models appear to have upended cybersecurity. Infosecurity explores what this means for ...
Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
A new variant in the Dirty Frag family of Linux local privilege escalation flaws has surfaced, the third root-level Linux ...
An updated variant of the FDMTP backdoor has been observed in a months-long espionage campaign aimed at networks in the ...
End-to-end encrypted (E2EE) Rich Communication Services (RCS) messaging is being rolled out in beta between iPhone and ...
The G7 Cybersecurity Working Group releases new SBOM for AI guidance, outlining seven key data clusters to boost transparency ...
Getting the basics right, understanding the threat and putting in place multi-layered defenses are key to protecting organizations from AI-powered cyber threats, the UK's Information Commissioner’s ...
The majority (93%) of global organizations use or plan to use AI agents for security tasks such as password resets and VPN ...
ShinyHunters has escalated its Canvas extortion campaign, defacing hundreds of school login pages and threatening to leak ...