Australian insurance provider Prosura is investigating a cyber incident after detecting unauthorized access to parts of its internal systems, which…
Vulnerabilities in a very popular Bluetooth system-on-a-chip (SoC) can be used to indirectly compromise smartphones, researchers at Germany’s Enno Rey…
Jan 08, 2026Ravie LakshmananVulnerability / KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security…
Many voice protection tools promise to block cloning by adding hidden noise to speech. Researchers at a Texas university found…
In the world of modern software engineering, deploying an application to production is no longer the finish line, it’s the…
Hackers are exploiting VMware ESXi instances in the wild with a zero-day exploit toolkit that chains multiple vulnerabilities for VM…
China’s state-sponsored cyber operations against Taiwan have intensified dramatically, with threat actors launching an average of 2.63 million intrusion attempts…
LockBit has solidified its position as the most prolific ransomware-as-a-service (RaaS) operation globally, accounting for approximately 21% of all documented…
A slowly unfolding high profile data breach affecting trans-Tasman health information portal ManageMyHealth has thousands of registered patients on edge…
ToddyCat, a sophisticated cyber-espionage threat group also known as Websiic and Storm-0247, has emerged as a significant risk to organizations…
A new wave of GoBruteforcer botnet malware attacks is targeting databases of cryptocurrency and blockchain projects on exposed servers believed to be…
A sophisticated phishing campaign is exploiting Google Cloud infrastructure to bypass email security filters and steal Microsoft 365 credentials, demonstrating…