Cyber Security

Meta’s Muse Spark takes AI a step closer to personal su...

Meta Superintelligence Labs has introduced Muse Spark, a natively multimodal rea...

Russia's Forest Blizzard Nabs Rafts of Logins Via SOHO ...

Heard of fileless malware? How about malwareless cyber espionage? Russia's APT28...

Threat Actors Get Crafty With Emojis to Escape Detection

When 🤖 means "bot available," 🧰 signifies "toolkit," or 💰💰💰 translates to "...

BlueHammer: Windows zero-day exploit leaked

A buggy but functional proof-of-concept (PoC) exploit for an unpatched Windows l...

AI-Led Remediation Crisis Prompts HackerOne to Pause Bu...

Discovery used to be the bottleneck for open source bugs, but with automated dis...

New Chaos Variant Targets Misconfigured Cloud Deploymen...

Cybersecurity researchers have flagged a new variant ofmalware called Chaosthat'...

Trellix strengthens data security for the GenAI era

Trellix announced enhanced data security capabilities and a strategic framework ...

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeti...

Cybersecurity researchers have lifted the curtain on a stealthy botnet that's de...

Fraud Rockets Higher in Mobile-First Latin America

Cyber-fraudsters move quickly from compromised devices to account takeover to fu...

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukr...

The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has...

Iranian Threat Actors Disrupt US Critical Infrastructur...

Attackers compromised Internet-facing OT devices and caused file and display man...

Social engineering attacks on open source developers ar...

North Korean hackers spent weeks socially engineering an Axios maintainer throug...

Shrinking the IAM Attack Surface through Identity Visib...

The Fragmented State of Modern Enterprise Identity Enterprise IAM is approaching...