General cybersecurity industry news, market trends, and analysis
The telecommunications equipment and services giant has blamed the incident on a third-party vendor.
A campaign by Russian-speaking cyberattackers hijacks workflows to deliver security-busting malware, allowing attackers to steal data without detection.
Codex Security, formerly Aardvark, has found hundreds of critical vulnerabilities in tested software in the past month.
Armadin uses AI-powered red teaming to find and exploit weaknesses in the same way that attackers attack them.
Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could have permitted attackers to run arbitrary SQL queries on victims' databases and exfiltrate sensitive data within organizations' Google Cloud environments. The shortcomings have been colle...
Salesforce has confirmed that customers are being targeted via poorly secured instances.
The company will deepen its platform's AI agent capabilities and scale engineering and go-to-market teams.
CISA has added the high-severity authentication bypass vulnerability to its KEV list, along with SolarWinds and Workspace One bugs.
Learn to audit AI agents and stop data leaks. Join our webinar to find hidden risks and secure your modern agentic workflows.
SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts.
Attack surface exposure leaves services reachable as exploits appear within 24–48 hours after disclosure, increasing breach risk.
APT28 deploys BEARDSHELL and COVENANT since April 2024 targeting Ukrainian military, enabling cloud-based espionage and persistent surveillance.