
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 86 articles
WhatsApp Taps AI with New Privacy-Focused Tech
WhatsApp is betting on a new strategy to bring artificial intelligence features to its users without compromising the...
Read More
AI Systems Riddled with Security Holes, Data Theft a Real Threat
Popular AI platforms are facing serious security questions after researchers discovered they are susceptible to...
Read More
SentinelOne Says Chinese Hackers Targeted Its Systems and Clients
A China-linked hacking group known as PurpleHaze attempted to infiltrate SentinelOne's infrastructure and the networks...
Read More
Zero-Day Exploits Still a Major Threat Google Spots 75 in the Wild This Year
Google's security researchers have uncovered 75 zero-day vulnerabilities actively exploited by attackers so far in...
Read More
ToyMaker Broker Peddles Network Access to CACTUS Ransomware Group
A cybercrime middleman known as ToyMaker is selling access to compromised networks, reportedly funneling victims...
Read More
North Korean Hackers Use Crypto Job Scams to Deploy Malware
A North Korean hacking group is disguising itself as legitimate cryptocurrency firms to lure unsuspecting job seekers...
Read More
SAP NetWeaver Under Attack Critical Flaw Lets Hackers Plant Web Shells
A serious security hole in SAP NetWeaver is being actively exploited, allowing attackers to inject malicious web shells...
Read More
Ruby Servers at Risk From Rack::Static Flaws, Experts Warn
Security researchers have uncovered a trio of vulnerabilities in Rack, a popular Ruby web server interface, that could...
Read More