US ends probe into Tesla remote driving feature
The US National Highway Traffic Safety Administration has closed a probe into nearly 2.6 million Tesla vehicles over a feature allowing users to move cars…
The US National Highway Traffic Safety Administration has closed a probe into nearly 2.6 million Tesla vehicles over a feature allowing users to move cars…
Juniper Networks this week released patches for nearly three dozen vulnerabilities, including Junos OS and Junos OS Evolved bugs that could lead to privilege escalation,…
UAT-10362 linked to LucidRook attacks targeting Taiwan-based institutions Pierluigi Paganini April 10, 2026 LucidRook is Lua malware used in phishing attacks on NGOs and universities…
The flaw is tracked as CVE-2026-34197 and carries a high severity rating (CVSS 8.8). It affects ActiveMQ Classic versions prior to 5.19.4 and several 6.x…
New research from Comparitech underscores how exposed ICS (industrial control systems) continue to present a tangible risk to critical infrastructure, with 179 internet-facing ICS devices…
Building management systems are rapidly becoming a high-risk entry point into critical infrastructure networks as organizations connect previously isolated systems to IP-based environments. Research from…
For medical professionals, data saves lives. For hackers, data drives profits. When one has the data, however, the other does not. This ongoing battle for…
Google says Gmail end-to-end encryption (E2EE) is now available on all Android and iOS devices, allowing enterprise users to read and compose emails without additional…
Iranian state-backed hacking group MuddyWater has made a decisive operational shift, adopting a Russian-built Malware-as-a-Service platform to power a new campaign against Israeli targets. The…
Censys has warned that more than 5,000 Rockwell Automation/Allen-Bradley PLCs are currently exposed to the internet as Iranian-affiliated APT actors actively target these devices across…
Welcome back to this series on security standards for operational technologies. In the last one we investigated IEC 61508 and IEC 61850. You can find…
Google has expanded Gmail client-side encryption to Android and iOS devices, allowing users to engage with their organization’s most sensitive data on mobile devices while…