Join Our Newsletter
Join our subscribers list to get the latest news, updates and special offers directly in your inbox
Security controls can do only so much. Here are four attacks where your employee...
Apple is bringing long-awaited end-to-end encryption to Rich Communication Servi...
Checkmarx has confirmed that a modified version of the Jenkins AST plugin was pu...
Google on Monday disclosed that it identified an unknown threat actor using a ze...
A threat actor named Mr_Rot13 has been attributed to the exploitation of a recen...
The UK’s data protection regulator, the Information Commissioner’s Office (ICO),...
Red Hat and Voyager Technologies announced the successful deployment of Red Hat ...
The privilege escalation vulnerability, which is similar to other Linux flaws li...
Zimperium launched Mobile App Response Agent, enabling security teams to respond...
Alation has introduced Alation AI Governance, a new offering that gives enterpri...
Google’s threat intelligence researchers have linked a zero-day exploit to AI-as...
Cyber adversaries have long used AI, but now attackers are using large language ...
Rough Monday. Somebody poisoned a trusted download again, somebody else turned c...
German authorities shut down a relaunched version of the criminal marketplace Cr...
SailPoint has introduced SailPoint Agentic Fabric, a new platform designed to he...
The campaign quietly compromises aerospace and drone operators to exfiltrate GIS...