Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths
CISA Highlights Exploited Wing FTP Vulnerability in KEV Catalog
CRITICAL: GlassWorm Attack Uses Stolen GitHub Tokens to Force-Push Malware Into Python Repos
CRITGlassWorm Attack Compromises Python Repos via Stolen GitHub Tokens
CRITICAL: Stryker attack wiped tens of thousands of devices, no malware needed
CRITStryker Cyberattack Wipes Devices Without Malware
CRITICAL: ⚡ Weekly Recap: Chrome 0-Days, Router Botnets, AWS Breach, Rogue AI Agents & More
CRITWeekly Security Recap: Chrome 0-Days and AWS Breach Stir Concerns
UK’s Companies House confirms security flaw exposed business data
HIGHSecurity Flaw in UK Companies House Exposes Business Data
CRITICAL: CISA flags Wing FTP Server flaw as actively exploited in attacks
CRITCISA Alerts on Critical Wing FTP Server Vulnerability Exploitation
Microsoft pulls Samsung app blocking Windows C: drive from Store
Microsoft Removes Samsung App Causing Windows 11 Issues
Shadow AI is everywhere. Here’s how to find and secure it.
Unmasking Shadow AI: Strategies for Securing Unsupervised AI Tools
ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers
ClickFix Campaigns Exploit User Interaction to Spread MacSync Infostealer
Why Security Validation Is Becoming Agentic
The Growing Importance of Integrated Security Validation
DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
HIGHDRILLAPP Backdoor Exploits Microsoft Edge for Espionage in Ukraine
Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
Android 17 Enhances Security by Restricting Accessibility API to Curb Malware
Showing 145-156 of 613 articles