Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
CISOs face a shrinking window to prepare as AI models like Mythos collapse the gap between vulnerability discovery and exploitation, driving a new era of high-velocity cyberattacks.
Basic-Fit has reported that hackers have stolen names, dates of birth, and even bank account details.
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
The company has released 19 new security notes addressing flaws in over a dozen enterprise products.
The sprawling cybercrime operation abuses major providers to prevent takedowns and distance itself from sanctions.
The parser is meant to mitigate the entire class of memory safety bugs in the low-level environment.
A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on Meta. "Mirax integrates advanced Remote Access Trojan (R...
Critical risk surged nearly 400% as AI-driven development increased vulnerabilities across 250 organizations.
The company said in an SEC filing that an IDOR vulnerability affecting RCI Internet Services exposed contractor data.
The security defects allow attackers to escalate privileges and execute arbitrary code remotely.
108 Chrome extensions routed stolen Google and Telegram data to shared C2 infrastructure, impacting 20,000 users.
ShowDoc CVE-2025-0520 exploited due to unpatched versions before 2.8.7, enabling remote code execution on 2,000+ instances.