admin
May 13, 2025
Moldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a series of...
admin
May 12, 2025
ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could...
admin
May 12, 2025
What do a source code editor, a smart billboard, and a web server have in common? They’ve...
admin
May 12, 2025
Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the...
admin
May 12, 2025
Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a lure to entice users...
Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection

2 min read
admin
May 10, 2025
Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits...
admin
May 10, 2025
Germany's Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked...
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation

4 min read
admin
May 9, 2025
A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network...
admin
May 9, 2025
The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of...
admin
May 9, 2025
Cybersecurity researchers are warning of a new campaign that's targeting Portuguese-speaking users in Brazil with trial versions...
admin
May 9, 2025
AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better...
admin
May 9, 2025
Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version...
admin
May 9, 2025
The Vulnerability Treadmill
The reactive nature of vulnerability management, combined with delays from policy and process, strains security...
admin
May 9, 2025
Google on Thursday announced it's rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across Chrome,...
admin
May 9, 2025
A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in...
admin
May 8, 2025
Cybersecurity researchers have exposed what they say is an "industrial-scale, global cryptocurrency phishing operation" engineered to steal...
admin
May 8, 2025
61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past...
admin
May 8, 2025
The nation-state threat actor known as MirrorFace has been observed deploying malware dubbed ROAMINGMOUSE as part of...
admin
May 8, 2025
The Russia-linked threat actor known as COLDRIVER has been observed distributing a new malware called LOSTKEYS as...
admin
May 8, 2025
Cisco has released software fixes to address a maximum-severity security flaw in its IOS XE Wireless Controller...