radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

689 articles
|
security

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Enhancing Tier 1 SOC Performance: A CISO's Guide

The Hacker NewsTHREATS28d
security

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

HIGH

Starkiller Phishing Suite Evades MFA with Advanced Proxy Tactics

The Hacker NewsTHREATS28d
security

AI Agents: The Next Wave Identity Dark Matter - Powerful, Invisible, and Unmanaged

AI Agents: Unseen Forces Transforming Enterprise Workflows

The Hacker NewsTHREATS28d
security

Amazon: Drone strikes damaged AWS data centers in Middle East

HIGH

Drone Strikes Disrupt AWS Data Centers in the Middle East

Bleeping ComputerTHREATS28d
security

Virginia’s Social Media Time‑Limit Law for Minors Blocked: Key Takeaways

Federal Court Blocks Virginia's Social Media Time-Limit Law for Minors

DLA Piper Privacy MattersCOMPLIANCE28d
security

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

HIGH

Microsoft Alerts on OAuth Redirect Abuse Targeting Government Sectors

The Hacker NewsTHREATS28d
security

CRITICAL: UH Cancer Center data breach affects nearly 1.2 million people

CRIT

Massive Data Breach at UH Cancer Center Exposes 1.2 Million Records

Bleeping ComputerTHREATS28d
security

Star Citizen game dev discloses breach affecting user data

Star Citizen Developer Cloud Imperium Games Reports User Data Breach

Bleeping ComputerTHREATS28d
security

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

HIGH

SloppyLemming Unleashes Dual Malware Chains on South Asian Governments

The Hacker NewsTHREATS28d
security

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

HIGH

Google Uncovers Active Exploitation of Qualcomm Android Vulnerability CVE-2026-21385

The Hacker NewsTHREATS28d
security

CRITICAL: Android gets patches for Qualcomm zero-day exploited in attacks

CRIT

Google Patches Critical Android Zero-Day Exploited in the Wild

Bleeping ComputerTHREATS28d
security

CyberStrikeAI tool adopted by hackers for AI-powered attacks

HIGH

CyberStrikeAI Tool Exploited for AI-Powered Cyber Attacks

Bleeping ComputerTHREATS28d

Showing 349-360 of 689 articles