Cyber Security

ImmuniWeb reports double-digit growth and platform adva...

ImmuniWeb has hit another all-time sales record in 2025, while successfully sust...

A fake romance turns into an Android spyware infection

ESET researchers have identified an Android spyware campaign that uses romance s...

OPNsense 26.1 brings updates to open-source firewall ma...

OPNsense, the open-source firewall and network security platform, reached versio...

Months After Patch, WinRAR Bug Poised to Hit SMBs Hardest

Russian and Chinese nation-state attackers are exploiting a months-old WinRAR vu...

Consumers Reluctant to Shop at Stores That Don't Take S...

The retail sector must adapt as consumers become more cybersecurity-conscious. I...

Fortinet Confirms New Zero-Day Behind Malicious SSO Logins

To stop the ongoing attacks, the cybersecurity vendor took the drastic step of t...

Fake Moltbot AI Coding Assistant on VS Code Marketplace...

Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio C...

Russian ELECTRUM Tied to December 2025 Cyber Attack on ...

The "coordinated" cyber attack targeting multiple sites across the Polish power ...

China-Backed 'PeckBirdy' Takes Flight for Cross-Platfor...

In two separate campaigns, attackers used the JScript C2 framework to target Chi...

Veracode’s platform enhancements help prevent software ...

Veracode announced significant platform innovations introduced through the secon...

WinRAR vulnerability still a go-to tool for hackers, Ma...

State-sponsored hackers and financially motivated attackers continue leveraging ...

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arb...

A critical sandbox escape vulnerability has been disclosed in the popular vm2 No...

Surging Cyberattacks Boost Latin America to Riskiest Re...

The region is up against tactics like data-leak extortion, credential-stealing c...

MIND DLP for Agentic AI protects sensitive data and con...

MIND announced DLP for Agentic AI, a data-centric approach to AI security design...

Two High-Severity n8n Flaws Allow Authenticated Remote ...

Cybersecurity researchers have disclosed two new security flaws in the n8n workf...

From Triage to Threat Hunts: How AI Accelerates SecOps

If you work in security operations, the concept of the AI SOC agent is likely fa...