News
"The implant is built as a malicious PAM (Pluggable Authentication Module), enabling attackers to silently bypass system ...
State-backed hackers breached Southeast Asia telecoms using advanced tools—no data stolen, but stealth access achieved.
Akira ransomware exploits SonicWall SSL VPNs, hitting patched devices. Organizations face risks from possible zero-day flaw.
Critical flaw in Cursor AI editor let attackers execute remote code via Slack and GitHub—fixed in v1.3 update.
The activity has been attributed to Storm-2603, which, according to Microsoft, is a suspected China-based threat actor that ...
The ongoing campaign, first detected in early 2025, is designed to use the OAuth applications as a gateway to obtain ...
In the npm ecosystem, postinstall scripts are often overlooked attack vectors—they run automatically after a package is ...
Russian APT Secret Blizzard uses ISP-level AitM attacks to deploy ApolloShadow malware on embassy devices in Moscow.
SentinelOne boosts enterprise cyber defense with AI-powered endpoint security, cutting response time and risk across ...
While SaaS-based SIEMs are marketed as a natural evolution, they often fall short of their on-prem predecessors in practice.
Threat actors abuse Proofpoint and Intermedia link wrapping to deliver phishing emails and steal Microsoft 365 credentials.
Pillar Security unveils full-lifecycle AI platform securing assets from design to runtime—critical for safe AI deployment.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results