Security

Microsoft is named a Leader in The Forrester Wave™: Sec...

Microsoft is proud to be named a Leader in The Forrester Wave™: Security Analyti...

Threat Actor Trojanizes Copy of SonicWall NetExtender V...

A threat actor hacked a version of SonicWall's NetExtender SSL VPN application i...

China-Nexus 'LapDogs' Network Thrives on Backdoored SOH...

The campaign infected devices in the US and Southeast Asia to build an operation...

Steel Giant Nucor Confirms Data Stolen in Cyberattack

America's largest steel producer initially disclosed the breach in May and took ...

How the US Military Is Redefining Zero Trust

Trust no longer comes from network boundaries alone but from continuously valida...

Oh! Canada Added to List of Nations Targeted in Salt Ty...

The Canadian Center for Cybersecurity has confirmed that the Chinese state-spons...

IBM Pushes for More Collaboration Between Security, Gov...

IBM is integrating its governance and AI security tools to address the risks ass...

The résumé is dying, and AI is holding the smoking gun

As thousands of applications flood job posts, 'hiring slop' is kicking off an AI...

Deep Dive into Automated Security Testing Tools

This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Ca...

Canadian telecom hacked by suspected China state group

Maximum-security Cisco vulnerability was patched Oct. 2023 and exploited Feb. 2025.

Navigating cyber risks with Microsoft Security Exposure...

Microsoft Security Exposure Management's eBook helps educate teams on how to ant...

SparkKitty Swipes Pics From iOS, Android Devices

Like its predecessor, SparkCat, the new malware appears to be going after sensit...

'Echo Chamber' Attack Blows Past AI Guardrails

An AI security researcher has developed a proof of concept that uses subtle, see...

Citrix Patches Critical Vulns in NetScaler ADC and Gateway

Citrix is recommending its customers upgrade their appliances to mitigate potent...

DHS Warns of Rise in Cyberattacks in Light of US-Iran C...

After President's Trump decision to enter the US into the conflict in the Middle...

Attackers Use Docker APIs, Tor Anonymity in Stealthy Cr...

The attack is similar to previous campaigns by an actor called Commando Cat to u...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.