News
The starting point of the attack is a compressed archive that's delivered to victims via malvertising or search engine ...
Zoom and Xerox patched critical flaws enabling privilege escalation and RCE, risking corporate network compromise.
"An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in ...
Charon ransomware targets Middle East sectors using APT-style evasion, causing faster, harder-to-recover encryption.
Microsoft fixed 111 vulnerabilities, including a Windows Kerberos zero-day enabling full AD compromise via BadSuccessor.
An AI SOC brings together a range of capabilities that strengthen and scale the core functions of a security operations ...
ShinyHunters and Scattered Spider are teaming up in a coordinated Salesforce phishing and extortion campaign, with ...
Coordinated brute-force attacks hit Fortinet SSL VPNs and FortiManager, involving 780+ malicious IPs from U.S., Canada, ...
Researchers found 35 Docker Hub images, including Debian builds, still carrying the XZ Utils backdoor a year later, ...
Dutch NCSC warns of CVE-2025-6543 Citrix attacks on critical organizations, urging urgent patches to prevent further breaches ...
The Ultimate Battle: Enterprise Browsers vs. Enterprise Browser Extensions examines this choice across nine "rounds": ...
Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results