Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers…
The Amazon Web Services outage in North Virginia was caused by a software bug in an automated DNS management system…
Microsoft 365 Exchange Online’s Direct Send feature, originally designed to enable legacy devices and applications to send emails without authentication,…
Security researchers have discovered a sophisticated method that allows attackers to steal access tokens from Microsoft Teams, potentially granting unauthorized…
Voice cloning has become fast, cheap, and convincing. With only a few minutes of recorded speech, generative models can recreate…
The Australian Communications and Media Authority (ACMA) has accused carriers of taking a weak stance when it comes to safeguarding…
The Bitter APT group, also tracked as APT-Q-37 and known in China as 蔓灵花, has launched a sophisticated cyberespionage campaign…
The Agenda ransomware group has evolved its attack methodology with a sophisticated technique that deploys Linux ransomware variants directly on…
AI coding tools are reshaping how software is written, tested, and secured. They promise speed, but that speed comes with…
SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious…
SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious…
Here’s a look at the most interesting products from the past week, featuring releases from Axoflow, Elastic, Illumio, Keycard, Netscout…











