RomCom Exploits Firefox & Windows Zero-Day Vulnerabilities
A Russia-aligned hacking group, known as RomCom (also identified as Storm-0978, Tropical Scorpius, or UNC2596), has successfully exploited two zero-day...
Read more →A Russia-aligned hacking group, known as RomCom (also identified as Storm-0978, Tropical Scorpius, or UNC2596), has successfully exploited two zero-day...
Read more →Artificial Intelligence (AI) has become a critical enabler across sectors, reshaping industries from healthcare to transportation. However, with its transformative...
Read more →The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a critical security flaw, CVE-2023-28461, to its Known Exploited...
Read more →China-linked threat actors are still inside U.S. telecom networks, and evicting them will require replacing “thousands and thousands and thousands”...
Read more →Russia is intensifying its efforts to leverage artificial intelligence (AI) to enhance cyberattacks against the United Kingdom, with concerns that...
Read more →The AI in cybersecurity market is experiencing unprecedented growth and is projected to continue expanding at a rapid pace. According...
Read more →EY Identity (EYI) announces its acquisition of Melbourne-based cybersecurity consulting firm, J Group Consulting. EYI acquisition move underlines a growing...
Read more →Microsoft Threat Intelligence analysts has shared new insights into North Korean and Chinese threat actors. At the recent CYBERWARCON, cybersecurity...
Read more →The U.S. Department of Justice (DOJ) has proposed a series of remedies to curb Google’s dominance in the online search...
Read more →International Game Technology (IGT), one of the largest gambling companies in the United States, has confirmed a significant cybersecurity incident...
Read more →The Indian Computer Emergency Response Team (CERT-In) has issued a detailed security advisory about multiple vulnerabilities found in the popular...
Read more →Artificial Intelligence (AI) is the hottest online commodity right now, and its integration into AI in fuzzing and automated vulnerability...
Read more →