News

The Pwn2Own competition is offering a $1m reward to any teams able to unearth a WhatsApp code execution exploit ...
Spikes in attacker activity precede the disclosure of vulnerabilities 80% of the time, according to a new GreyNoise report ...
Semperis found that executives were physically threatened in 40% of ransomware incidents, in a bid to pressure victims to pay ...
Designed with ease of use and speed in mind, the Eviction Strategies Tool allows cyber defenders to craft detailed playbooks ...
Experts argue that password managers are still useful despite Microsoft Authenticator ditching its capabilities ...
Security experts have warned of a huge surge in identity-based attacks, after revealing that 1.8 billion credentials were ...
The UK’s AI Security Institute is teaming up with international partners to lead a £15m project focused on researching AI ...
A decryptor for the FunkSec ransomware has been developed and made avaliable to download for free by researchers at antivirus ...
Microsoft has observed Russian state actor Secret Blizzard using an AiTM position to gain initial access, assisted by ...
The DoubleTrouble Android banking Trojan has evolved, using Discord for delivery and introducing several new features ...
VulnCheck’s Known Exploited Vulnerabilities catalog were weaponized before being detected or within the following day ...
Cybersecurity giant Palo Alto Networks reached a definitive agreement to acquire identity security specialist CyberArk for ...