Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
CRITICAL: Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates
CRITKeenadu Backdoor Threatens Android Tablets with Firmware-Level Exploitation
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
HIGHAI Assistants Exploited as Stealthy Malware C2 Proxies
Notepad++ boosts update security with ‘double-lock’ mechanism
HIGHNotepad++ Enhances Update Security with Innovative 'Double-Lock' Mechanism
EU: EDPB and EDPS publish joint opinion on the European Commission’s Proposal for the Digital Omnibus on AI
EU Proposes Simplified AI Regulations Without Compromising Safeguards
Microsoft Teams outage affects users in United States, Europe
Microsoft Teams Outage Disrupts Users Across US and Europe
SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer
HIGHSmartLoader Campaign Exploits Trojanized Oura MCP Server to Deploy StealC Infostealer
CRITICAL: New Keenadu backdoor found in Android firmware, Google Play apps
CRITKeenadu Backdoor Threatens Android Devices with Unrestricted Control
What 5 Million Apps Revealed About Secrets in JavaScript
HIGHMassive JavaScript Secret Leak: 5 Million Apps Scanned
My Day Getting My Hands Dirty with an NDR System
Exploring the Role of NDR Systems in Network Security
Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
HIGHHarnessing AI for Swift Cloud Breach Investigations
Poland arrests suspect linked to Phobos ransomware operation
HIGHPoland Arrests Key Suspect in Phobos Ransomware Operation
Australia’s Social Media “Ban” and the eSafety Commissioner’s Social Media Minimum Age Regulatory Guidance
Australia's Groundbreaking Social Media Ban Sparks Global Interest
Showing 505-516 of 672 articles