A bank, an airport, a non-profit and the Israeli branch of a US software company were among the targets of this new MuddyWater campaign ...
The number of zero-day vulnerabilities uncovered in enterprise software and appliances reached an all-time high last year, analysis by Google Threat Intelligence Group (GTIG) has warned. In the report ...
Unlike traditional cyberattacks, which target systems and data, psychological warfare targets people. Here's what ...
Malicious insiders are using misusing AI for nefarious gain, while employees cutting corners also creates risk, warns Mimecast ...
The flaw was discovered by Noma Labs researchers in the Context7 platform operated by Upstash. Context7 is used by developers to provide AI assistants such as Cursor, Claude Code and Windsurf with ...
Google's Threat Intelligence Group (GTIG) said the toolkit, internally named Coruna, includes 5 full exploit chains and 23 vulnerabilities designed to infiltrate devices and extract sensitive ...
Ox Security warns that Mail2Shell could enable threat actors to hijack FreeScout systems without user interaction ...
Networking giant Cisco has released 25 joint security advisories covering security patches for 48 vulnerabilities in across its Secure Firewall Adaptive Security Appliance (ASA), Secure Firewall ...
LeakBase was an English-language site operating on the surface web which facilitated an illegal trade in stolen data, including stealer logs - archives of stolen credentials harvested through ...
A coalition of seven Western nations has launched guidelines to help integrate security-by-design principles into future 6G ...
The effort was led by Microsoft and Europol and supported by a range of industry partners, including TrendAI, Cloudflare, Coinbase, Crowell, eSentire, Health-ISAC, Intel471, Proofpoint, Resecurity, ...
A surge in attempts to compromise internet-connected surveillance cameras across the Middle East has been identified during the ongoing regional conflict, with activity attributed to infrastructure ...