Optus’ chief technology officer Tony Baird is set to leave the carrier and will hand over the role to Telstra…
Health tech gadgets displayed at the annual CES trade show make a lot of promises. A smart scale promoted a…
Three malicious npm packages are targeting JavaScript developers to steal browser logins, API keys, and cryptocurrency wallet data. The packages,…
Security teams spend a lot of time stitching together checks across container images, running workloads, and deployment pipelines. The work…
Australian insurance provider Prosura is investigating a cyber incident after detecting unauthorized access to parts of its internal systems, which…
Vulnerabilities in a very popular Bluetooth system-on-a-chip (SoC) can be used to indirectly compromise smartphones, researchers at Germany’s Enno Rey…
Jan 08, 2026Ravie LakshmananVulnerability / KEV Catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security…
Many voice protection tools promise to block cloning by adding hidden noise to speech. Researchers at a Texas university found…
In the world of modern software engineering, deploying an application to production is no longer the finish line, it’s the…
Hackers are exploiting VMware ESXi instances in the wild with a zero-day exploit toolkit that chains multiple vulnerabilities for VM…
China’s state-sponsored cyber operations against Taiwan have intensified dramatically, with threat actors launching an average of 2.63 million intrusion attempts…
LockBit has solidified its position as the most prolific ransomware-as-a-service (RaaS) operation globally, accounting for approximately 21% of all documented…