Cyber Security

GlassWorm Attack Uses Stolen GitHub Tokens to Force-Pus...

The GlassWorm malware campaign is being used to fuel an ongoing attack that leve...

Attackers Abuse LiveChat to Phish Credit Card, Personal...

A social engineering campaign impersonating PayPal and Amazon uses customer supp...

⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Bre...

Some weeks in security feel normal. Then you read a few tabs and get that immedi...

Orca Platform enhancements use AI to cut cloud alert noise

Orca Security has announced major enhancements to the Orca Platform, introducing...

NinjaOne Vulnerability Management enables real-time det...

NinjaOne has unveiled NinjaOne Vulnerability Management, a new solution that hel...

Stellar Cyber 6.4.0 reduces alert noise and speeds inve...

Stellar Cyber has announced he general availability of version 6.4.0 of its plat...

Meta ditches end-to-end encrypted messaging on Instagram

End-to-end encrypted messaging on Instagram will no longer be supported after Ma...

Fingerprint’s MCP Server turns device intelligence into...

Fingerprint has announced the launch of its Model Context Protocol (MCP) Server,...

Why Security Validation Is Becoming Agentic

If you run security at any reasonably complex organization, your validation stac...

ClickFix Campaigns Spread MacSync macOS Infostealer via...

Three different ClickFix campaigns have been found to act as a delivery vector f...

KEEQuant advances chip-scale QKD for telecom, data cent...

KEEQuant has announced its commercial chip-scale QKD technology, marking an adva...

Hackers tried to breach Poland’s nuclear research centre

Poland’s National Centre for Nuclear Research (NCBJ) thwarted a cyberattack targ...

Microsoft Edge 146 adds IP privacy and local network ac...

Microsoft Edge version 146 (Stable) became available on March 13, 2026, bringing...

DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edg...

Ukrainian entities have emerged as the target of a new campaign likely orchestra...

JSOC IT’s AUTOPSY platform puts security stacks under l...

JSOC IT has announced the launch of AUTOPSY, a security verification platform th...

45,000 malicious IP addresses taken down, 94 suspects a...

An international law enforcement operation has taken down more than 45,000 malic...