Cybersecurity Outlook 2025: A Year Of Change
As organizations grow more dependent on technology, the risks associated with cyber attacks, data breaches, and system disruptions continue to intensify. The World Economic Forum’s…
As organizations grow more dependent on technology, the risks associated with cyber attacks, data breaches, and system disruptions continue to intensify. The World Economic Forum’s…
Italy’s Data Protection Authority Garante requested information from Deepseek Pierluigi Paganini January 30, 2025 Italy’s data privacy regulator Garante has requested information from Chinese AI…
Our researcher community is the beating heart of our bug bounty platform, identifying hard-to-find vulnerabilities and improving security for our customers. Investing in this community…
There is a lot of focus, rightly so, on the consumer IoT space. We have had a lot of incidents in the past few years…
Jan 30, 2025Ravie LakshmananVulnerability / IoT Security A Mirai botnet variant dubbed Aquabot has been observed actively attempting to exploit a medium-severity security flaw impacting…
A critical security vulnerability has been identified in TeamViewer Clients for Windows, allowing attackers with local access to escalate their privileges to the system level. …
Jan 30, 2025Ravie LakshmananWeb Security / Vulnerability Three security flaws have been disclosed in the open-source PHP package Voyager that could be exploited by an…
How Apple will go from the worst AI to the best Apple’s about to go from having the worst AI implementation to having the best.…
The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper Horse and supported by HackerOne,…
Cybercriminals recently exploited Google’s g.co subdomain to carry out a meticulously crafted scam over a vishing call. The incident was chronicled by Zach Latta, founder…
Traditional monitoring tools reveal only traffic from the Chrome process, leaving security teams uncertain about which extension is responsible for a suspicious DNS query. ExtensionHound…
Cybercriminals are increasingly exploiting vulnerabilities in government websites to carry out phishing campaigns, leveraging the inherent trust users place in official domains. A recent report…