News

The Pwn2Own competition is offering a $1m reward to any teams able to unearth a WhatsApp code execution exploit ...
Spikes in attacker activity precede the disclosure of vulnerabilities 80% of the time, according to a new GreyNoise report ...
Designed with ease of use and speed in mind, the Eviction Strategies Tool allows cyber defenders to craft detailed playbooks ...
Security experts have warned of a huge surge in identity-based attacks, after revealing that 1.8 billion credentials were ...
The comprehensive guidance focuses on technical recommendations for securing agentic AI applications, from development to ...
Semperis found that executives were physically threatened in 40% of ransomware incidents, in a bid to pressure victims to pay ...
Experts argue that password managers are still useful despite Microsoft Authenticator ditching its capabilities ...
The UK’s AI Security Institute is teaming up with international partners to lead a £15m project focused on researching AI ...
A decryptor for the FunkSec ransomware has been developed and made avaliable to download for free by researchers at antivirus ...
The DoubleTrouble Android banking Trojan has evolved, using Discord for delivery and introducing several new features ...
Microsoft has observed Russian state actor Secret Blizzard using an AiTM position to gain initial access, assisted by ...
VulnCheck’s Known Exploited Vulnerabilities catalog were weaponized before being detected or within the following day ...