Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve ...
Google says Gmail end-to-end encryption (E2EE) is now available on all Android and iOS devices, allowing enterprise users to ...
The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes ...
Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most ...
A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees' salary payments after hijacking their accounts in payroll pirate attacks.
Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication ...
Dutch healthcare software vendor ChipSoft has been impacted by a ransomware attack that forced the company to take offline ...
Google has rolled out Device Bound Session Credentials (DBSC) protection in Chrome 146 for Windows, designed to block ...
A new Lua-based malware, called LucidRook, is being used in spear-phishing campaigns targeting non-governmental organizations ...
Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called "VENOM" are targeting credentials ...
Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at ...
Hackers hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and Joomla, and pushed a malicious version ...