Mozilla updates Firefox Terms of Use again after privacy concerns over broad data rights language. Company clarifies no ...
Hackers now scan port 1098 to exploit RDP vulnerabilities, targeting 740,000 IPs daily. Microsoft patches two critical flaws.
Cellebrite's zero-day exploit bypassed an Android lock screen to access a Serbian activist’s phone. Amnesty links attack to ...
Nearly 12,000 live secrets found in LLM training data, exposing AWS, Slack, and Mailchimp credentials—raising AI security ...
Cybercriminals use fake CAPTCHAs in phishing PDFs to spread Lumma Stealer, targeting 7,000+ users via Webflow, GoDaddy, and ...
Winos 4.0 malware, deployed via phishing emails impersonating Taiwan’s tax authority, steals data through keylogging, ...
Sticky Werewolf deploys Lumma Stealer via phishing attacks in Russia and Belarus, stealing credentials, banking data, and ...
Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their ...
TgToxic malware evolves with advanced anti-analysis, DGA-based C2, and global expansion, targeting banking and crypto users ...
AI-driven SOC 3.0 automates 100% of alerts, cuts response time from days to minutes, and enables proactive threat ...
Space Pirates deploys LuckyStrike Agent malware to infiltrate Russian IT networks, using OneDrive for C2 and evading ...
Leaked Black Basta chat logs expose internal conflicts, $107M in ransom earnings, and new attack tactics. Key members defect, ...