Cyber Security

Google limits Android accessibility API to curb malware...

Google is restricting how Android apps can use accessibility features after year...

DarkSword iOS Exploit Kit Uses 6 Flaws, 3 Zero-Days for...

A new exploit kit for Apple iOS devices designed to steal sensitive data from is...

Omnix AI Advisor brings real-time credential threat ins...

Dashlane has unveiled Omnix AI Advisor, a natural-language AI security assistant...

Java 26 ships with new cryptography API and HTTP/3 support

Oracle released JDK 26, the 17th consecutive feature release delivered under the...

Samba 4.24.0 ships Kerberos hardening and a CVE fix for...

Samba 4.24.0 arrived carrying a set of Kerberos security changes aimed at Active...

Keysight SBOM Manager simplifies global cybersecurity c...

Keysight Technologies has launched Keysight SBOM Manager, a new solution designe...

Arcjet enables inline defense against prompt injection ...

Arcjet has released AI Prompt Injection Protection, a new capability designed to...

EU Sanctions Companies in China, Iran for Cyberattacks

Already sanctioned in the US and the UK, these rulings prohibit companies and a ...

CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Z...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged gover...

Your APIs are under siege, and attackers are just getti...

Internet-facing systems are handling sustained levels of malicious traffic acros...

Elite members of North Korean society fake their way in...

Increased federal activity, including indictments over the past year, has drawn ...

AI got it wrong with high confidence. Now what?

In this Help Net Security interview, Christian Debes, Head of Data Analytics & A...

Betterleaks: Open-source secrets scanner

Secrets scanning has become standard practice across engineering organizations, ...

C2 Implant 'SnappyClient' Targets Crypto Wallets

In addition to enabling remote access, the malware supports a wide range of capa...

DarkSword: iPhone Exploit Kit Serves Spies & Thieve...

A sophisticated iOS exploit chain leverages multiple zero-day vulnerabilities an...

Researchers: Meta, TikTok Steal Personal & Financia...

Tracking pixels let social media companies spy on their users even after they cl...