Cybersecurity researchers have disclosed two security flaws in Google’s Vertex machine learning (ML) platform that, if successfully...
Blog
Your blog category
Threat actors are exploiting Microsoft Visio files and SharePoint to launch two-step phishing attacks, according to researchers...
A threat actor known as BrazenBamboo has exploited an unresolved security flaw in Fortinet’s FortiClient for Windows...
Cybersecurity researchers have shed light on a new remote access trojan and information stealer used by Iranian...
Palo Alto Networks has released new indicators of compromise (IoCs) a day after the network security vendor...
A critical authentication bypass vulnerability has been disclosed in the Really Simple Security (formerly Really Simple SSL)...
A new phishing campaign is targeting e-commerce shoppers in Europe and the United States with bogus pages...
Legal documents released as part of an ongoing legal tussle between Meta’s WhatsApp and NSO Group have...
IT leaders know the drill—regulators and cyber insurers demand regular network penetration testing to keep the bad...
What do hijacked websites, fake job offers, and sneaky ransomware have in common? They’re proof that cybercriminals...