The Department of Justice is suing Fulton County, Georgia and its election clerk over the county’s refusal to hand over…
The Cybersecurity and Infrastructure Security Agency has released critical guidance on managing UEFI Secure Boot configurations across enterprise systems. The…
New research from Kaspersky has mapped the complete lifecycle of data stolen during phishing attacks, revealing a sophisticated “shadow market…
Cybersecurity researchers are calling attention to a new campaign that’s leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based…
MITRE has released its annual Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list for 2025, identifying the most critical…
Technology professionals hoping to come and work in the US face a new privacy concern from Monday. Starting December 15,…
In 2026, cyber security will be shaped less by individual tools and more by how humans govern autonomous systems. Artificial…
A data breach at Coupang that exposed the information of 33.7 million customers has been tied to a former employee…
A sophisticated information-stealing tool known as JSCEAL has evolved significantly in recent months, deploying advanced anti-analysis techniques and hardened command-and-control…
A coordinated and new malware campaign is exploiting the popular developer platform, GitHub. The target? Professionals in IT administration, cybersecurity,…
US president Donald Trump has directed his administration to begin work on establishing a national artificial intelligence (AI) regulation framework…
A fake torrent for Leonardo DiCaprio’s ‘One Battle After Another’ hides malicious PowerShell malware loaders inside subtitle files that ultimately…

