Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
HIGHMitigating Zero-Day Vulnerabilities Through Attack Surface Reduction
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
HIGHAI Agents: The New 'Invisible Employee' and Their Security Risks
CISA: Recently patched Ivanti EPM flaw now actively exploited
HIGHIvanti EPM Vulnerability Under Active Exploitation, CISA Urges Immediate Patching
APT28 hackers deploy customized variant of Covenant open-source tool
HIGHAPT28 Utilizes Customized Covenant Framework for Espionage
Microsoft to enable Windows hotpatch security updates by default
Microsoft to Default Hotpatch Security Updates for Windows in 2026
CRITICAL: CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
CRITCISA Identifies Active Exploitation in SolarWinds, Ivanti, and Workspace One Vulnerabilities
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
HIGHSalesforce Experience Cloud Targeted by Threat Actors Using Modified AuraInspector
Google: Cloud attacks exploit flaws more than weak credentials
HIGHCloud Security Threats: Vulnerabilities Overtake Weak Credentials
Microsoft Teams phishing targets employees with backdoors
HIGHMicrosoft Teams Phishing Attack Deploys A0Backdoor via Quick Assist
Ericsson US discloses data breach after service provider hack
HIGHEricsson US Faces Data Breach After Service Provider Hack
Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
HIGHMalicious npm Package Impersonates OpenClaw Installer to Deploy RAT
CRITICAL: ShinyHunters claims ongoing Salesforce Aura data theft attacks
CRITShinyHunters Exploits Salesforce Aura for Data Theft
Showing 229-240 of 620 articles