News

Valid, complete reports detailing remote code execution or elevation of privilege bugs in .NET qualify for the maximum ...
Gen Z’s lifestyle and blurred personal-professional boundaries are creating new opportunities for cybercriminals to exploit.
Microsoft investigates whether the ToolShell exploit was leaked via MAPP, port cybersecurity, physical backdoor used for ATM ...
Russian state-sponsored APT Secret Blizzard has used ISP-level AitM attacks to infect diplomatic devices with malware.
Echo received funding for creating container images that are not affected by any CVE, for enterprise-grade software infrastructure.
Meta is sponsoring ZDI’s Pwn2Own, where participants can earn big prizes for smartphone, WhatsApp and wearable device ...
Two US senators introduced a bipartisan bill to help prepare federal government agencies for quantum computing threats.
LayerX has disclosed an AI chatbot hacking method via web browser extensions it has named ‘man-in-the-prompt’.
SentinelLabs connects the dots between prolific Chinese state-sponsored hackers and companies developing intrusion tools.
Chinese researchers are exploring cyber attacks, sabotage, and space-based countermeasures to disrupt Elon Musk’s Starlink ...
Honeywell patched several critical and high-severity vulnerabilities in its Experion PKS  industrial process control and ...
CISA announced new resources for security teams looking to contain cyberattacks and evict hackers from their networks.