The Coruna exploit kit has 23 exploits targeting iOS devices, previously used in Russian attacks and now in cybercrime ...
Europol, Microsoft, and cybersecurity companies announced the takedown of the widely used phishing-as-a-service platform ...
LexisNexis has confirmed a data breach after hackers leaked data allegedly stolen from its systems, but impact is limited.
The deal awaits final shareholder and regulatory approvals and is expected to be completed in the second half of 2026.
Bounty-hunting became mainstream in 2012 with Bugcrowd and HackerOne. These were followed by, for example, YesWeHack (2015) and Intigriti (2016) in Europe. Used correctly, bounty platforms take away ...
Preventing of the consequence of cracked or pirated software focuses on user awareness training to recognize the threat.
JetStream Security launched with $34 million in seed funding to help organizations gain visibility into AI assets across ...
Starting September 2026, Google will release new major Chrome iterations every two weeks to minimize disruptions and simplify debugging.
LastPass is warning users of a new phishing campaign that aims to trick them into handing over their master password.
Webinar: How an OT SOC delivers continuous visibility and cyber resilience across critical infrastructure sectors.
The Global Coalition on Telecoms has published a set of principles covering the security and resilience of next-generation 6G networks.
A critical-severity FreeScout vulnerability can be exploited for remote code execution without authentication or user interaction.