Cyber Security

RansomHub claims alleged breach of Apple partner Luxshare

Chinese electronic manufacturer and Apple partner Luxshare Precision Industry ha...

Webinar: How Smart MSSPs Using AI to Boost Margins with...

Every managed security provider is chasing the same problem in 2026 — too many a...

Exposure Assessment Platforms Signal a Shift in Focus

Gartner® doesn’t create new categories lightly. Generally speaking, a new acrony...

Linux users targeted by crypto thieves via hijacked app...

Cryptocurrency thieves have found a new way to turn trusted software packages fo...

Chainlit AI Framework Flaws Enable Data Theft via File ...

Security vulnerabilities were uncovered in the popular open-source artificial in...

VoidLink Linux Malware Framework Built with AI Assistan...

The recently discovered sophisticated Linux malware framework known as VoidLink ...

Pro-Russian hacktivist campaigns continue against UK or...

The UK’s National Cyber Security Centre reports ongoing cyber operations by Russ...

cside targets hidden website privacy violations with Pr...

cside announced the launch of Privacy Watch. The platform prevents website priva...

LastPass Warns of Fake Maintenance Messages Targeting U...

LastPass is alerting users to a new active phishing campaign that's impersonatin...

CERT/CC Warns binary-parser Bug Allows Node.js Privileg...

A security vulnerability has been disclosed in the popular binary-parser npm lib...

Cybercriminals speak the language young people trust

Criminal groups actively recruit, train, and retain people in structured ways. T...

Bandit: Open-source tool designed to find security issu...

Bandit is an open-source tool that scans Python source code for security issues ...

The 2026 State of Pentesting: Why delivery and follow-t...

Penetration testing has evolved significantly over the past several years. While...

Security leaders push for continuous controls as audits...

Security teams say they want real-time insight into controls, but still rely on ...

'CrashFix' Scam Crashes Browsers, Delivers Malware

The attack consists of a NexShield malicious browser extension, a social enginee...

Mass Spam Attacks Leverage Zendesk Instances

The CRM vendor advised ignoring or deleting suspicious emails and said the attac...