Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
HIGHFortiGate Firewalls Exploited in Credential Theft Campaign
Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws
HIGHMicrosoft March 2026 Patch Tuesday Addresses 2 Zero-Days and 79 Vulnerabilities
KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
HIGHKadNap Malware Hijacks Over 14,000 Asus Routers for Botnet Operations
New KadNap botnet hijacks ASUS routers to fuel cybercrime proxy network
HIGHKadNap Botnet Exploits ASUS Routers for Cybercrime Proxy Network
Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys
HIGHMicrosoft Enhances Windows Security with Phishing-Resistant Entra Passkeys
New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
HIGHLeakyLooker Flaws in Google Looker Studio Pose Cross-Tenant SQL Threat
The New Turing Test: How Threats Use Geometry to Prove 'Humanness'
HIGHMalware Adopts Geometry to Outsmart Sandboxes
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
HIGHMitigating Zero-Day Vulnerabilities Through Attack Surface Reduction
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
HIGHAI Agents: The New 'Invisible Employee' and Their Security Risks
CISA: Recently patched Ivanti EPM flaw now actively exploited
HIGHIvanti EPM Vulnerability Under Active Exploitation, CISA Urges Immediate Patching
APT28 hackers deploy customized variant of Covenant open-source tool
HIGHAPT28 Utilizes Customized Covenant Framework for Espionage
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
HIGHSalesforce Experience Cloud Targeted by Threat Actors Using Modified AuraInspector
Showing 121-132 of 372 articles