Abusing DNS record management controls, the threat actor hides the location of malicious content via Cloudflare.
Forty-two cybersecurity-related merger and acquisition (M&A) deals were announced by companies in February 2026.
A new ClickFix attack variant uses fake CAPTCHA pages instructing victims to paste and execute malicious commands in Windows Terminal.
A newly discovered InstallFix campaign relies on malicious commands on cloned installation webpages to trick victims into installing malware.
Recent Cisco Catalyst SD-WAN vulnerability, initially exploited as a zero-day, is now being used more frequently by threat ...
New U.S. cybersecurity strategy outlines six pillars aimed at deterring cyber threats, protecting critical infrastructure, ...
Distributed through over 100 GitHub repositories, the BoryptGrab stealer targets browser, wallet, system, and other user data ...
The FBI is investigating “suspicious activities” on a system that contains sensitive information related to surveillance ...
Anthropic seeks restrictions of its AI technology from being used for for mass surveillance of Americans or fully autonomous weapons.
CVE-2021-22681, an old vulnerability affecting ICS products from Rockwell Automation, has been exploited in attacks.
LexisNexis has confirmed a data breach after hackers leaked data allegedly stolen from its systems, but impact is limited.
The JVG algorithm factors RSA and ECC keys using fewer quantum resources than Shor’s algorithm, accelerating the time needed ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results