Mozilla updates Firefox Terms of Use again after privacy concerns over broad data rights language. Company clarifies no ...
Cellebrite's zero-day exploit bypassed an Android lock screen to access a Serbian activist’s phone. Amnesty links attack to ...
TgToxic malware evolves with advanced anti-analysis, DGA-based C2, and global expansion, targeting banking and crypto users ...
Cybercriminals use fake CAPTCHAs in phishing PDFs to spread Lumma Stealer, targeting 7,000+ users via Webflow, GoDaddy, and ...
Nearly 12,000 live secrets found in LLM training data, exposing AWS, Slack, and Mailchimp credentials—raising AI security ...
Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their ...
Winos 4.0 malware, deployed via phishing emails impersonating Taiwan’s tax authority, steals data through keylogging, ...
FBI confirms North Korea’s Lazarus Group stole $1.5B from Bybit, surpassing 2024’s total crypto heists. Investigations reveal ...
Microsoft identifies four cybercriminals behind Storm-2139, an AI abuse scheme exploiting Azure OpenAI services for illicit ...
AI-driven SOC 3.0 automates 100% of alerts, cuts response time from days to minutes, and enables proactive threat ...
Sticky Werewolf deploys Lumma Stealer via phishing attacks in Russia and Belarus, stealing credentials, banking data, and ...
PolarEdge botnet exploits unpatched Cisco router flaw to infect 2,017 devices globally, using a TLS backdoor and FTP payloads ...