Cyber Security

Citizen Lab: Law Enforcement Used Webloc to Track 500 M...

Hungarian domestic intelligence, the national police in El Salvador, and several...

Hims Breach Exposes the Most Sensitive Kinds of PHI

Threat actors breached the telehealth brand, and now they may know who's bald, o...

Your Next Breach Will Look Like Business as Usual

These are the fundamental detection model shifts cybersecurity teams need to mak...

ClickFix campaign delivers Mac malware via fake Apple page

Security researchers at Jamf have uncovered a new ClickFix-style attack targetin...

Can Anthropic Keep Its Exploit-Writing AI Out of the Wr...

Its Mythos Preview model, which can allegedly find and exploit critical zero-day...

Industrial Controllers Still Vulnerable As Conflicts Mo...

The US government warns programmable logic controllers are being targeted, and r...

GlassWorm Campaign Uses Zig Dropper to Infect Multiple ...

Cybersecurity researchers have flagged yet another evolution of the ongoing Glas...

Poisoned “Office 365” search results lead to stolen pay...

A financially motivated hacking group is targeting Canadian employees with a sop...

Browser Extensions Are the New AI Consumption Channel T...

While much of the discussion on AI security centers around protecting ‘shadow’ A...

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hour...

A critical security vulnerability in Marimo, an open-source Python notebook for ...

Health insurance lead sites sell personal data within s...

Lead generation websites that offer health insurance quotes collect sensitive pe...

What vibe hunting gets right about AI threat hunting, a...

In this Help Net Security interview, Aqsa Taylor, Chief Security Evangelist, Exa...

April 2026 Patch Tuesday forecast: Spring-cleaning of a...

I just blinked and the first quarter of the year is GONE. Where does the time go...

Apiiro CLI turns AI coding assistants into full-stack s...

The Apiiro CLI brings the Apiiro platform to your terminal and to your AI coding...