Kaspersky researchers have laid out the details of the vulnerabilities that lay behind 2023’s Triangulation attack campaign. In July, Apple rushed…
The US National Institute for Standards and Technology (NIST) has warned against accepting vendor claims about artificial intelligence security, saying…
Multiple implementations of the Kyber key encapsulation mechanism for quantum-safe encryption, are vulnerable to a set of flaws collectively referred to…
A campaign delivering the AsyncRAT malware to select targets has been active for at least the past 11 months, using…
U.S. mortgage lender loanDepot has suffered a cyberattack that caused the company to take IT systems offline, preventing online payments…
A cyber attack hit the Beirut International Airport Pierluigi Paganini January 07, 2024 A cyber attack hit the Beirut International…
Iranian crypto exchange Bit24.cash leaks user passports and IDs Pierluigi Paganini January 07, 2024 Bit24.cash has inadvertently exposed sensitive data…
SMTP smuggling is a technique that allows an attacker to send an email from pretty much any address they like….
British police are investigating a case involving a virtual sexual assault of a girl’s avatar. Even though there was no…
“The most wonderful time of the year” is known for its generous sales, holiday cheer, and the notion of miracles…
Bug bounty programs that pay people for finding bugs are a very useful tool for improving the security of software….
As the world steps closer to 2024, the cybersecurity industry is poised to witness some transformative changes. The cybersecurity predictions…









