Cyber News

Researchers Find VS Code Flaw Allowing Attackers to Rep...

Cybersecurity researchers have discovered a loophole in the Visual Studio Code M...

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,...

The maintainers of the nx build system have alerted users to a supply chain atta...

Hidden Vulnerabilities of Project Management Tools & Ho...

Every day, businesses, teams, and project managers trust platforms like Trello, ...

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud M...

Picture this: Your team rolls out some new code, thinking everything's fine. But...

Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to...

The China-linked advanced persistent threat (APT) actor known as Salt Typhoon ha...

Don’t let “back to school” become “back to (cyber)bully...

Cyberbullying is a fact of life in our digital-centric society, but there are wa...

Someone Created the First AI-Powered Ransomware Using O...

Cybersecurity company ESET has disclosed that it discovered an artificial intell...

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing...

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) an...

First known AI-powered ransomware uncovered by ESET Res...

The discovery of PromptLock shows how malicious use of AI models could superchar...

ShadowSilk Hits 35 Organizations in Central Asia and AP...

A threat activity cluster known as ShadowSilk has been attributed to a fresh set...

Anthropic Disrupts AI-Powered Cyberattacks Automating T...

Anthropic on Wednesday revealed that it disrupted a sophisticated operation that...

Someone Created First AI-Powered Ransomware Using OpenA...

Cybersecurity company ESET has disclosed that it discovered an artificial intell...

Storm-0501 Exploits Entra ID to Exfiltrate and Delete A...

The financially motivated threat actor known as Storm-0501 has been observed ref...

Salesloft OAuth Breach via Drift AI Chat Agent Exposes ...

A widespread data theft campaign has allowed hackers to breach sales automation ...

Blind Eagle’s Five Clusters Target Colombia Using RATs,...

Cybersecurity researchers have discovered five distinct activity clusters linked...

The 5 Golden Rules of Safe AI Adoption

Employees are experimenting with AI at record speed. They are drafting emails, a...