Cyber Security

Linux developers weigh emergency “killswitch” for vulne...

Linux kernel developers are reviewing a proposal for an emergency risk mitigatio...

Your Purple Team Isn't Purple — It's Just Red and Blue ...

Defending a network at 2 am looks a lot like this: an analyst copy-pasting a has...

The scam economy has found its AI upgrade

Scam attempts continue to reach consumers via email, text messages, social media...

The questionnaire-based TPRM model is broken, and Trust...

TrustCloud announced a new version of TrustLens, its third party risk management...

Instagram messaging encryption removed, and privacy adv...

After introducing optional end-to-end encrypted messaging in 2023, Instagram ann...

Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face...

A malicious Hugging Face repository managed to take a spot in the platform's tre...

Security teams are turning to AI to survive alert overload

The World Economic Forum white paper “Empowering Defenders: AI for Cybersecurity...

Review: Foundations of Cybersecurity, 2nd edition

Jason Andress has refreshed his introductory security text for No Starch Press. ...

Rustinel: Open-source endpoint detection for Windows an...

Open-source endpoint detection has long been split between Windows-focused tools...

Ollama Out-of-Bounds Read Vulnerability Allows Remote P...

Cybersecurity researchers have disclosed a critical security vulnerability in Ol...

Week in review: cPanel vulnerability actively exploited...

Here’s an overview of some of last week’s most interesting news, articles, inter...

cPanel, WHM Release Fixes for Three New Vulnerabilities...

cPanel has released updates to address three vulnerabilities in cPanel and Web H...

ShinyHunters Claims Second Attack Against Instructure

The edtech company is struggling to wrest control from its hackers. PII belongin...

TCLBANKER Banking Trojan Targets Financial Platforms vi...

Threat hunters have flagged a previously undocumented Brazilian banking trojan d...

Fake Call History Apps Stole Payments From Users After ...

Cybersecurity researchers have discovered fraudulent apps on the official Google...

Dirty Frag: Unpatched Linux vulnerability delivers root...

A week after Copy Fail, another Linux local privilege escalation vulnerability d...