
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 89 articles
Bogus WordPress Security Plugin Grants Hackers Admin Control
A malicious campaign is exploiting WordPress users by disguising malware as a legitimate security plugin, researchers...
Read More
Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign
Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for...
Read More
Russia and Ukraine Under Siege by Stealthy DarkWatchman Malware
A sophisticated phishing operation is targeting Russian organizations, deploying the DarkWatchman malware with tactics...
Read More
WhatsApp Taps AI with New Privacy-Focused Tech
WhatsApp is betting on a new strategy to bring artificial intelligence features to its users without compromising the...
Read More
AI Systems Riddled with Security Holes, Data Theft a Real Threat
Popular AI platforms are facing serious security questions after researchers discovered they are susceptible to...
Read More
SentinelOne Says Chinese Hackers Targeted Its Systems and Clients
A China-linked hacking group known as PurpleHaze attempted to infiltrate SentinelOne's infrastructure and the networks...
Read More
Zero-Day Exploits Still a Major Threat Google Spots 75 in the Wild This Year
Google's security researchers have uncovered 75 zero-day vulnerabilities actively exploited by attackers so far in...
Read More
ToyMaker Broker Peddles Network Access to CACTUS Ransomware Group
A cybercrime middleman known as ToyMaker is selling access to compromised networks, reportedly funneling victims...
Read More