Cyber Security

DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edg...

Ukrainian entities have emerged as the target of a new campaign likely orchestra...

JSOC IT’s AUTOPSY platform puts security stacks under l...

JSOC IT has announced the launch of AUTOPSY, a security verification platform th...

45,000 malicious IP addresses taken down, 94 suspects a...

An international law enforcement operation has taken down more than 45,000 malic...

Fake scandal clips on Facebook bait victims into invest...

Bitdefender researchers uncovered hundreds of scam campaigns promoted through Fa...

VulHunt: Open-source vulnerability detection framework

Binarly has published VulHunt Community Edition, making the core scanning engine...

What smart factories keep getting wrong about cybersecu...

In this Help Net Security interview, Packsize CSO Troy Rydman breaks down the bi...

Certificate lifespans are shrinking and most organizati...

The push for shorter TLS certificate lifespans has been building for years. It s...

Android 17 Blocks Non-Accessibility Apps from Accessibi...

Google is testing a new security feature as part of Android Advanced Protection ...

Week in review: AiTM phishing kit used to hijack AWS ac...

Here’s an overview of some of last week’s most interesting news, articles, inter...

OpenClaw AI Agent Flaws Could Enable Prompt Injection a...

China's National Computer Network Emergency Response Technical Team (CNCERT) has...

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extens...

Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign...

The Data Gap: Why Nonprofit Cyber Incidents Go Underrep...

Threat actors target nonprofits due to security gaps and highly coveted informat...

Cyberattackers Don't Care About Good Causes

Sightline Security's founder and advisory board discuss how cybersecurity poses ...

Why Post-Quantum Cryptography Can't Wait

Organizations have to prepare to ensure they have cryptography in place in the p...

Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos

The excitement around Cisco's latest SD-WAN bugs has inspired some light fraud, ...

Chinese Hackers Target Southeast Asian Militaries with ...

A suspected China-based cyber espionage operation has targeted Southeast Asian m...