A critical pre-authentication remote code execution (RCE) vulnerability in Marimo is now under active exploitation, leveraged ...
An international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of ...
Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve ...
OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 ...
Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most ...
Google says Gmail end-to-end encryption (E2EE) is now available on all Android and iOS devices, allowing enterprise users to ...
Dutch healthcare software vendor ChipSoft has been impacted by a ransomware attack that forced the company to take offline ...
The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes ...
A financially motivated threat actor tracked as Storm-2755 is stealing Canadian employees' salary payments after hijacking ...
Stolen credentials turn authentication systems into the attack surface. Token shows how wearable biometric authentication ...
Threat actors using a previously undocumented phishing-as-a-service (PhaaS) platform called "VENOM" are targeting credentials ...
A new Lua-based malware, called LucidRook, is being used in spear-phishing campaigns targeting non-governmental organizations ...