A K-12 school safety and student well-being solutions provider that runs a tip-reporting platform has reportedly been hit by a major cyberattack. The breach may have exposed the personal information ...
Threat actors have demonstrated just how quickly they operate today after exploiting a critical open source vulnerability ...
Companies House has suspended online filings after a user flagged a major security shortcoming in its systems, which allowed users to edit the ...
Out of 28, only six didn't have any concerns. Find out what problems we uncovered and how to keep your dash cam secure ...
As users (and detection tools) have gotten better at identifying the signs of a malware infection and savvy enough to avoid them in the first place, some cybercriminals have changed tactics.
One allows a remote attacker to execute arbitrary code inside a sandbox, the other could result in loss of sensitive information.
Apple has released security updates to patch older iPhones and iPads against a set of vulnerabilities targeted in ...
A Windows exploit that grants system-level access to attackers is currently up for sale on the dark web for $220,000.
Chinese state hackers and spyware vendors are fueling a rise in zero-day attacks, which increasingly target enterprise software and devices — security and networking products in particular.
Suppliers of commercial spyware have edged ahead of nation-state threat actors when it comes to the exploitation of zero-day vulnerabilities at scale, according to data released by the Google Threat ...
A previously undocumented set of 23 iOS exploits named “Coruna” has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks. The Coruna kit contains ...
A purpose-built AI security agent detected vulnerabilities in 92% of exploited DeFi smart contracts in a new open-source benchmark. The study, released Thursday by AI security firm Cecuro, evaluated ...