The top lawmakers on a key House cybersecurity panel are hoping to remove a barrier to entry for cyber jobs…
Cybersecurity researchers have uncovered an ongoing campaign where threat actors exploit the critical CVE-2024-36401 vulnerability in GeoServer, a geospatial database,…
Threat actors linked to the Russian government are falling back on a seven-year-old vulnerability in Cisco equipment that was first…
Agentic artificial intelligence (AI) web browsers that can act autonomously on users’ behalf appear to be extremely gullible and unsafe…
Quishing, a powerful form of phishing that uses malicious hyperlinks contained in QR codes to expose user credentials and sensitive…
The Ministry of Defence (MoD) has admitted there have been more than 12 times as many data breaches linked to…
The Chinese state-backed threat group Silk Typhoon has raised the pace of attacks targeting government, technology, legal and professional services…
The Kali Linux team has announced a significant enhancement of its Vagrant image build process, streamlining development and simplifying deployment…
Researchers have discovered a complex campaign using trojanized software that uses authentic code-signing certificates to avoid detection and turn compromised…
Qilin ransomware claims a 4TB data breach at Nissan CBI, leaking car design files, financial data, 3D models, and VR…
Federal Trade Commission Chair Andrew Ferguson warned U.S. tech companies not to accede to laws in foreign countries that weaken…
A sophisticated cyber espionage campaign attributed to APT MuddyWater has emerged targeting Chief Financial Officers and finance executives across Europe,…











