The npm ecosystem faces a sophisticated new threat as ten malicious packages have emerged, each designed to automatically execute during…
Google has released comprehensive guidance on protecting privileged accounts, recognizing that stolen credentials have become one of the most dangerous…
Sanctions are one of the tools Western governments use when they want to hit back at state-sponsored cyber threat actors….
Paying attackers a ransom to recover from ransomware attacks fails 41% of the time, and even when recovery keys work,…
Microsoft has resolved a known issue that caused Windows updates to fail, leading to 0x800F081F errors on Windows 11 24H2…
A public exploit code demonstrating how attackers could exploit CVE-2025-40778, a critical vulnerability in BIND 9 that enables DNS cache…
Russian-linked attackers have intensified their targeting of Ukrainian organizations through sophisticated intrusions that rely heavily on legitimate Windows tools rather…
Commvault introduced Data Rooms, a secure environment that enables enterprises to safely connect their trusted backup data to the AI…
It seems that with every new agentic browser we discover yet another way to abuse one. OpenAI recently introduced a…
Microsoft Exchange servers in Germany are still running without security updates, just weeks after the official end of support for…
A critical security vulnerability was discovered when a complete 4-terabyte SQL Server backup belonging to Ernst & Young (EY), one…
The Women in Cybersecurity Report, a 2-minute video hosted by Cybercrime Magazine Deputy Editor Amanda Glassner, highlights the latest breakthroughs, voices, and…











