Category: cyberscoop
Threat hunters and a collection of unconfirmed victims are responding to a series of attacks targeting Salesforce customers, which the…
Washington has rediscovered consequences. Just not consistently. The March 6 executive order rests on a simple, correct idea: cyber-enabled fraud…
Artificial intelligence may be enhancing cyber threats, but the defensive approach to those AI-amplified attacks remains the same, a top…
Microsoft addressed 83 vulnerabilities that cut across its broad portfolio of enterprise software and underlying services in its latest security…
A federal judge has blocked Perplexity, makers of the Comet AI browser, from accessing user Amazon accounts and making purchases…
A maximum-severity vulnerability in pac4j, an open-source library integrated into hundreds of software packages and repositories, poses a significant security…
According to a recent report, the State Department sent a cable urging U.S. diplomats to oppose international data sovereignty regulations…
The Trump administration is plotting an interagency body to confront malign hackers, pilot programs to secure critical infrastructure across states…
Flights canceled. Emergency rooms shut down. Centuries-old companies shuttered. Ransomware and other similar cyberattacks have become so routine that even…
Can anonymity on the internet survive in the age of generative AI? A recent study from ETH Zurich examined how Large…
Tycoon 2FA, a major phishing kit and platform that allowed low-skilled cybercriminals to bypass multifactor authentication and conduct large-scale adversary-in-the-middle…
Cisco released information on a pair of max-severity vulnerabilities in its firewall management software Wednesday that unauthenticated, remote attackers could…











