General cybersecurity industry news, market trends, and analysis
Targeting six iOS vulnerabilities and leading to full device compromise, the exploit chain is meant for surveillance.
A prompt injection vulnerability paired with other flaws can turn a Google search into a full attack chain that could threaten enterprise networks.
Cyber risk doesn’t stop at your perimeter. Today’s most dangerous threats could be hiding in your software supply chain.
The sanctions target two Chinese individuals, two Chinese companies, and one Iranian firm involved in hacking EU member states.
From Chaos to Control examines the chaos that often comes from shadow AI hidden in SaaS apps and urges better visibility and control over agentic AI.
Focused on securing autonomous AI on endpoints, the startup will invest in product development.
The suspected India-linked threat group targets governments, telecom, and critical infrastructure using spear-phishing, old vulnerabilities, and rapidly rotating infrastructure to maintain persistent access.
Tracking pixels let social media companies spy on their own customers when they click over to advertiser sites, gleaning credit card info, currency type, and more.
The medtech giant has been working on restoring systems affected by the cyberattack conducted by the Handala hackers.
The lightweight updates are meant to deliver security protections between security updates.
Magecart hides payload in favicon EXIF via third-party scripts, bypassing static analysis and stealing checkout data at runtime.
Researchers uncovered 9 vulnerabilities across 4 IP KVM devices enabling unauthenticated root access and code execution.