Hackers have begun leveraging AI agents to validate stolen credit cards, marking a new era in the sophistication of financial…
In 2024, we saw the adoption of AI in hacking workflows take off. In a survey of over 2,000 security researchers…
A help desk phishing campaign targets an organization’s Microsoft Active Directory Federation Services (ADFS) using spoofed login pages to steal…
The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Linux kernel vulnerability, CVE-2024-53104, to its Known Exploited Vulnerabilities…
Alphabet CEO Sundar Pichai has committed to continue investing in its cloud arm, as the firm’s fourth-quarter results confirmed Google…
Android and iOS apps on the Google Play Store and Apple App Store contain a malicious software development kit (SDK)…
IBM has released critical security updates addressing multiple vulnerabilities in its Cloud Pak for Business Automation software. These vulnerabilities, if…
“Our partners say that for some survivors they are in touch with inside the scam centers, even if they can…
The US Cybersecurity & Infrastructure Security Agency (CISA) has added four vulnerabilities to its Known Exploited Vulnerabilities catalog, urging federal agencies…
A new report from FortiGuard Labs reveals that Chinese hackers are actively targeting Linux devices with a sophisticated SSH backdoor…
XE Group, a cybercriminal outfit that has been active for over a decade, has been quietly exploiting zero-day vulnerabilities (CVE-2025-25181,…
Applause, which provides digital quality and crowd-sourced testing, has worked with Cisco to ensure ongoing accessibility assessments of Webex Suite and…











