Here’s a look at the most interesting products from the past week, featuring releases from Bitdefender, PowerDMARC, Skyhawk Security, Stellar…
North Korean cyber spies created two businesses in the US, in violation of Treasury sanctions, to infect developers working in…
Attackers exploited nearly a third of vulnerabilities within a day of CVE disclosure in the first quarter of 2025, VulnCheck…
The Cybersecurity and Infrastructure Security Agency will soon have a new second-in-command. Madhu Gottumukkala has been named deputy director. He…
Two federal cybersecurity officials said Thursday that they’re using — or contemplating using — artificial intelligence to conduct tasks that…
Cybercriminals are increasingly weaponizing Scalable Vector Graphics (SVG) files to orchestrate sophisticated phishing campaigns. According to research from Intezer, a…
China-backed actors “stand out” in threatening America’s energy infrastructure and could disrupt the country’s power networks in the event of…
Lauren Goode: I think Katie should go first. She’s the boss. Katie Drummond: So as you all know, because I…
Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to deploy malicious tools including a web…
A federal court partially blocked a Trump administration executive order Thursday that seeks to impose requirements on states to use…
The form and quiz-building tool is a popular vector for social engineering and malware. Here’s how to stay safe. 23…
Russian threat actors have been abusing legitimate OAuth 2.0 authentication workflows to hijack Microsoft 365 accounts of employees of organizations related…











