admin
May 2, 2025
Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows...
admin
May 2, 2025
The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called...
Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

2 min read
admin
May 2, 2025
A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big...
admin
May 1, 2025
Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as...
admin
May 1, 2025
Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing...
admin
May 1, 2025
Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an...
admin
May 1, 2025
For over a decade, application security teams have faced a brutal irony: the more advanced the detection...
DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics

3 min read
admin
May 1, 2025
Russian companies have been targeted as part of a large-scale phishing campaign that's designed to deliver a...
admin
May 1, 2025
Enterprise data backup platform Commvault has revealed that an unknown nation-state threat actor breached its Microsoft Azure...
admin
May 1, 2025
SonicWall has revealed that two now-patched security flaws impacting its SMA100 Secure Mobile Access (SMA) appliances have...
[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats
![[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqbZf4bsDp6ei3fmQ8swm7GB5XoRrhZSFE7ZNhRLFO49KlmdgpIDCZWMSv7rydpEShIrNb9crnH5p6mFZbURzO5HC9I4RlzJazBBw5aHOTmI38sqiZIWPldRqut4bTgegipjOk5VgktVOwCKF_ncLeBX-pMTO_GMVMfbzZbf8eAj21V04y_NiOaSApGkM/s728-rw-e365/webinar-play.jpg)
2 min read
admin
April 30, 2025
How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore.
Today’s attackers don’t...
admin
April 30, 2025
A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool...
admin
April 30, 2025
As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has...
admin
April 30, 2025
Everyone has cybersecurity stories involving family members. Here’s a relatively common one. The conversation usually goes something...
admin
April 30, 2025
Cybersecurity researchers have revealed that RansomHub's online infrastructure has "inexplicably" gone offline as of April 1, 2025,...
Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code

2 min read
admin
April 30, 2025
Meta on Tuesday announced LlamaFirewall, an open-source framework designed to secure artificial intelligence (AI) systems against emerging...
admin
April 30, 2025
A high court in the Indian state of Karnataka has ordered the blocking of end-to-end encrypted email...
WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy

3 min read
admin
April 29, 2025
Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence...
admin
April 29, 2025
Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that...
admin
April 29, 2025
Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its...