Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys
HIGHMicrosoft Enhances Windows Security with Phishing-Resistant Entra Passkeys
New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
HIGHLeakyLooker Flaws in Google Looker Studio Pose Cross-Tenant SQL Threat
The New Turing Test: How Threats Use Geometry to Prove 'Humanness'
HIGHMalware Adopts Geometry to Outsmart Sandboxes
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
HIGHMitigating Zero-Day Vulnerabilities Through Attack Surface Reduction
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
HIGHAI Agents: The New 'Invisible Employee' and Their Security Risks
CISA: Recently patched Ivanti EPM flaw now actively exploited
HIGHIvanti EPM Vulnerability Under Active Exploitation, CISA Urges Immediate Patching
APT28 hackers deploy customized variant of Covenant open-source tool
HIGHAPT28 Utilizes Customized Covenant Framework for Espionage
Microsoft to enable Windows hotpatch security updates by default
Microsoft to Default Hotpatch Security Updates for Windows in 2026
CRITICAL: CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
CRITCISA Identifies Active Exploitation in SolarWinds, Ivanti, and Workspace One Vulnerabilities
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
HIGHSalesforce Experience Cloud Targeted by Threat Actors Using Modified AuraInspector
Google: Cloud attacks exploit flaws more than weak credentials
HIGHCloud Security Threats: Vulnerabilities Overtake Weak Credentials
Microsoft Teams phishing targets employees with backdoors
HIGHMicrosoft Teams Phishing Attack Deploys A0Backdoor via Quick Assist
Showing 253-264 of 685 articles