Critical flaws in Fluent Bit threaten telemetry across platforms according to an advisory published by Oligo Security ...
Morphisec has observed a new operation embedding StealC V2 malware in Blender project files, targeting users via 3D assets ...
Customers of Iberia Airlines will need to be on high alert for phishing attacks after the carrier revealed personal ...
It was reported by Oracle on November 21 and added to CISA Known Exploited Vulnerabilities (KEV) catalog the same day ...
The International Defence Esports Games (IDEG) will help sharpen cyber and battlefield skills for allied soldiers ...
Salesforce believes there has been unauthorized access to its customers’ data through the Gainsight app’s connection to its ...
Researchers at BlackFrog have uncovered Matrix Push C2, a malicious command-and-control system that abuses web browser push ...
A multi-year ATM fraud campaign by UNC2891 targeted two Indonesian banks, cloning cards, recruiting money mules and ...
Gartner predicts that two-fifths of organizations will suffer security and compliance incidents due to shadow AI by 2030 ...
One of these operations was “AyySSHush,” a China-linked operation which also exploited CVE-2023-39780 to target end-of-life ...
Despite a growing maturity of third-party risk management programs, supply chain attacks impacted more organizations in 2025 ...
A major US real estate firm has been targeted with an advanced intrusion attempt using Tuoni C2, combining social engineering ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results