Cyber Security

AI-Driven Pushpaganda Scam Exploits Google Discover to ...

Cybersecurity researchers have unmasked a novel ad fraud scheme that has been fo...

Oligo enables real-time exploit detection and blocking ...

Oligo Security has unveiled Runtime Exploit Blocking, a new capability that stop...

Claroty advances CPS security with Visibility Orchestra...

Claroty has revealed new Visibility Orchestration capabilities in its Saas offer...

W3LL phishing service sold for $500 dismantled by the FBI

The W3LL phishing kit, a cybercrime tool used to impersonate legitimate login pa...

Google Adds Rust-Based DNS Parser into Pixel 10 Modem t...

Google has announced the integration of a Rust-based Domain Name System (DNS) pa...

Binary Defense expands NightBeacon with threat-aligned ...

Binary Defense has announced the launch of NightBeacon Detect, a new module with...

Booking.com data breach: Customer reservation data exposed

“Unauthorized third parties may have been able to access certain booking informa...

DataVisor brings conversational AI agents to fraud and ...

DataVisor has announced Vera, a suite of conversational AI agents designed to co...

Basic-Fit hack compromises data of up to 1 million members

Basic-Fit, a European gym chain, disclosed that hackers breached one of its inte...

DavMail 6.6.0 patches a regex flaw and advances its Mic...

Organizations that run DavMail to bridge standard mail clients to Microsoft Exch...

Mirax Android RAT Turns Devices into SOCKS5 Proxies, Re...

A nascent Android remote access trojan called Mirax has been observed actively t...

AI adoption is outpacing the safeguards around it

AI is becoming part of professional and private life, reaching mainstream adopti...

Google to penalize sites that hijack the back button

Google is broadening its spam policies to crack down on “back button hijacking,”...

Analysis of 216M Security Findings Shows a 4x Increase ...

OX Security recently analyzed 216 million security findings across 250 organizat...

108 Malicious Chrome Extensions Steal Google and Telegr...

Cybersecurity researchers have discovered a new campaign in which a cluster of 1...

29 million leaked secrets in 2025: Why AI agents creden...

AI agents need credentials to work. They authenticate with LLM platforms, connec...