Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
Bitdefender GravityZone webinar shows how mid-market teams consolidate security tools to reduce complexity and improve resilience.
Threat actors replace legitimate commands on the cloned installation webpages with malicious commands.
Malicious Chrome extensions tied to ownership transfers push malware and steal data, exposing thousands to credential theft and system compromise.
New hacking cluster exploits web servers and Mimikatz to infiltrate Asian infrastructure for long-term espionage in aviation, energy, and govt sectors
No description available.
AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over…
Athanasios Rantos, the Advocate General of the Court of Justice of the EU (CJEU), has issued a formal opinion suggesting that banks must immediately refund account holders affected by unauthorized transactions, even when it's their fault.
Threat actors are abusing the special-use ".arpa" domain and IPv6 reverse DNS in phishing campaigns that more easily evade domain reputation checks and email security gateways.
WatchTowr reports seeing exploitation attempts for CVE-2026-20127 from numerous unique IP addresses.
OpenAI launches Codex Security AI agent that scanned 1.2M commits, finding 792 critical and 10,561 high-severity vulnerabilities in open-source projec
Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.