Cisco has fixed 48 vulnerabilities in Firewall ASA, Secure FMC, and Secure FTD appliances, including two critical-severity ...
The Coruna exploit kit has 23 exploits targeting iOS devices, previously used in Russian attacks and now in cybercrime ...
LexisNexis has confirmed a data breach after hackers leaked data allegedly stolen from its systems, but impact is limited.
Europol, Microsoft, and cybersecurity companies announced the takedown of the widely used phishing-as-a-service platform ...
JetStream Security launched with $34 million in seed funding to help organizations gain visibility into AI assets across ...
LastPass is warning users of a new phishing campaign that aims to trick them into handing over their master password.
The deal awaits final shareholder and regulatory approvals and is expected to be completed in the second half of 2026.
The Global Coalition on Telecoms has published a set of principles covering the security and resilience of next-generation 6G networks.
Starting September 2026, Google will release new major Chrome iterations every two weeks to minimize disruptions and simplify debugging.
Bounty-hunting became mainstream in 2012 with Bugcrowd and HackerOne. These were followed by, for example, YesWeHack (2015) and Intigriti (2016) in Europe. Used correctly, bounty platforms take away ...
CVE-2026-22719, a recently patched vulnerability in VMware Aria Operations, has been exploited in the wild, CISA warned.
Webinar: How an OT SOC delivers continuous visibility and cyber resilience across critical infrastructure sectors.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results